Auto-Update: 2025-01-13T21:00:21.256051+00:00

This commit is contained in:
cad-safe-bot 2025-01-13 21:03:46 +00:00
parent 1d968ebe17
commit 20eab6f7d0
50 changed files with 3509 additions and 315 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-9085",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-12-27T10:15:12.217",
"lastModified": "2024-12-27T10:15:12.217",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T19:35:55.387",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,12 +69,64 @@
"value": "CWE-476"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:b612_firmware:b612s-25dtcpu-v100r001b192d03sp00c234:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA74362-63EF-402C-8DE4-608BF00B9A22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:b612_firmware:b612s-25dtcpu-v100r001b192d03sp00c287:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B3FDDF-0E22-4778-B4B3-A9E77A7E8D80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:b612_firmware:b612s-25dtcpu-v100r001b192d05sp00c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D187A75B-E3D7-4B34-B2E5-F5FA8E557F80"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:b612:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F304357B-3B8D-49C0-AD8A-DC7F11B586BC"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200826-01-pointer_en",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-9086",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-12-27T10:15:12.800",
"lastModified": "2024-12-27T10:15:12.800",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T19:34:15.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,12 +69,64 @@
"value": "CWE-124"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:b612_firmware:b612s-25dtcpu-v100r001b192d03sp00c234:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA74362-63EF-402C-8DE4-608BF00B9A22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:b612_firmware:b612s-25dtcpu-v100r001b192d03sp00c287:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B3FDDF-0E22-4778-B4B3-A9E77A7E8D80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:b612_firmware:b612s-25dtcpu-v100r001b192d05sp00c00:*:*:*:*:*:*:*",
"matchCriteriaId": "D187A75B-E3D7-4B34-B2E5-F5FA8E557F80"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:b612:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F304357B-3B8D-49C0-AD8A-DC7F11B586BC"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200826-01-buffer_en",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-9253",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-12-27T10:15:16.610",
"lastModified": "2024-12-27T10:15:16.610",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T19:38:19.563",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,12 +69,55 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:lion-al00c_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.1.0.150\\(c00e136r5p3\\)",
"matchCriteriaId": "0DECBFA7-FD9F-420C-846C-FA096498AC63"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:lion-al00c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE20666-6456-48C3-B612-95DC67FA1FE1"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2020/huawei-sa-20200715-08-smartphone-en",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47207",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-10T19:15:48.400",
"lastModified": "2024-11-21T06:35:37.800",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-13T20:42:37.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,71 +15,214 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: gus: corrige la desreferencia de puntero nulo en el bloque de puntero El bloque de puntero devuelto por snd_gf1_dma_next_block podr\u00eda ser nulo, por lo que existe un posible problema de desreferencia de puntero nulo. Solucione esto agregando una verificaci\u00f3n nula antes de la desreferencia."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.293",
"matchCriteriaId": "83024F84-4857-4CAF-957E-C14804BAC4AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.291",
"matchCriteriaId": "8B1EE39E-FE30-4B7D-A26F-631135BCBB3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.256",
"matchCriteriaId": "FCEB92FF-21BF-4F75-ACA1-6AE1D51A79FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.218",
"matchCriteriaId": "4F85F433-5DEA-47D3-B07E-3B1AC474D6E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.162",
"matchCriteriaId": "51A152D8-D5CE-47BD-9041-DEE164DCE99D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.82",
"matchCriteriaId": "AE501832-500C-4EF1-9489-5C13674F619D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.5",
"matchCriteriaId": "2128A085-4C0C-4C1E-9E9C-0DD868E2170F"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/16721797dcef2c7c030ffe73a07f39a65f9323c3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1ac6cd87d8ddd36c43620f82c4d65b058f725f0f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3e28e083dcdf03a18a083f8a47b6bb6b1604b5be",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/542fa721594a02d2aee0370a764d306ef48d030c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a0d21bb3279476c777434c40d969ea88ca64f9aa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ab4c1ebc40f699f48346f634d7b72b9c5193f315",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c6d2cefdd05c4810c416fb8d384b5c377bd977bc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cb09c760c201f82df83babc92a5ffea0a01807fc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/16721797dcef2c7c030ffe73a07f39a65f9323c3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1ac6cd87d8ddd36c43620f82c4d65b058f725f0f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3e28e083dcdf03a18a083f8a47b6bb6b1604b5be",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/542fa721594a02d2aee0370a764d306ef48d030c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a0d21bb3279476c777434c40d969ea88ca64f9aa",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ab4c1ebc40f699f48346f634d7b72b9c5193f315",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c6d2cefdd05c4810c416fb8d384b5c377bd977bc",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cb09c760c201f82df83babc92a5ffea0a01807fc",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47325",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:19.613",
"lastModified": "2024-11-21T06:35:53.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-13T20:04:48.480",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,47 +15,151 @@
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommu/arm-smmu: corrige la fuga de recuento de referencias de arm_smmu_device en la traducci\u00f3n de direcciones. El problema de recuento de referencias ocurre en varias rutas de manejo de excepciones de arm_smmu_iova_to_phys_hard(). Cuando ocurren esos escenarios de error, la funci\u00f3n se olvida de disminuir el recuento de \"smmu\" aumentado en arm_smmu_rpm_get(), lo que provoca una fuga de recuento. Solucione este problema saltando a la etiqueta \"out\" cuando se produzcan esos escenarios de error."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.134",
"matchCriteriaId": "E8906CE9-ED5B-4D67-A356-65A3B757C7A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.52",
"matchCriteriaId": "7C1E6FB6-53C8-4DC4-8AE5-93094BA39F62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.12.19",
"matchCriteriaId": "34C1A2F4-DD44-4CF1-8FD4-751A0D746A9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13",
"versionEndExcluding": "5.13.4",
"matchCriteriaId": "F93FA3CC-0C79-410B-A7D7-245C2AA0723A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48639",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-28T13:15:06.857",
"lastModified": "2024-11-21T07:33:40.237",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-13T19:58:08.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,47 +15,182 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: sched: corrige posible fuga de recuento en tc_new_tfilter() Es necesario llamar a tfilter_put para colocar el recuento obtenido mediante tp->ops->get para evitar una posible fuga de recuento cuando se realiza la cadena. >tmplt_ops != NULL y cadena->tmplt_ops != tp->ops."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1",
"versionEndExcluding": "5.4.215",
"matchCriteriaId": "FB86E655-C5BA-4C24-AB8D-C2BC589EA8D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.146",
"matchCriteriaId": "A9C1CF48-9C3A-4236-8546-BD32D742BFB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.71",
"matchCriteriaId": "080C1827-D257-4D5A-9071-779EF7F5EF0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.19.12",
"matchCriteriaId": "03B0F56B-C5CC-4E81-BB51-D07D569DE4CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E8BD11A3-8643-49B6-BADE-5029A0117325"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5F0AD220-F6A9-4012-8636-155F1B841FAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A46498B3-78E1-4623-AAE1-94D29A42BE4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "F8446E87-F5F6-41CA-8201-BAE0F0CA6DD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "8E5FB72F-67CE-43CC-83FE-541604D98182"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3A0A7397-F5F8-4753-82DC-9A11288E696D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0559d91ee3a2cd81b15ad5cd507539d6da867f88",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8844c750eeb03452e2b3319c27a526f447b82596",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/903f7d322c17d8e306d766404b4604e81653902a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c2e1cfefcac35e0eea229e148c8284088ce437b5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f8162aed962be8fa07445b2b5928e84ab40dd8d7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0559d91ee3a2cd81b15ad5cd507539d6da867f88",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8844c750eeb03452e2b3319c27a526f447b82596",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/903f7d322c17d8e306d766404b4604e81653902a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c2e1cfefcac35e0eea229e148c8284088ce437b5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f8162aed962be8fa07445b2b5928e84ab40dd8d7",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29743",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T23:15:09.840",
"lastModified": "2024-11-21T07:57:27.740",
"lastModified": "2025-01-13T20:15:25.387",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29745",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:10.200",
"lastModified": "2024-11-21T07:57:27.887",
"lastModified": "2025-01-13T20:15:26.130",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2952",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-30T23:15:09.887",
"lastModified": "2024-11-21T07:59:38.173",
"lastModified": "2025-01-13T20:15:26.313",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-835"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30196",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T12:15:09.677",
"lastModified": "2024-11-21T07:59:53.313",
"lastModified": "2025-01-13T20:15:26.557",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33734",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T22:15:10.737",
"lastModified": "2024-11-21T08:05:55.107",
"lastModified": "2025-01-13T20:15:26.797",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33740",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T22:15:10.777",
"lastModified": "2024-11-21T08:05:55.560",
"lastModified": "2025-01-13T19:15:09.237",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33741",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T22:15:10.820",
"lastModified": "2024-11-21T08:05:55.710",
"lastModified": "2025-01-13T19:15:10.213",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34152",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-30T22:15:11.070",
"lastModified": "2024-12-02T14:34:31.887",
"vulnStatus": "Analyzed",
"lastModified": "2025-01-13T19:15:10.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52523",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-02T22:15:48.213",
"lastModified": "2024-11-21T08:39:57.693",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T19:57:06.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,151 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, sockmap: rechaza las redirecciones de salida de sk_msg a sockets que no son TCP. Con un mapa SOCKMAP/SOCKHASH y un programa sk_msg, el usuario puede dirigir los mensajes enviados desde un socket TCP (s1) para que realmente salgan desde otro socket TCP (s2): tcp_bpf_sendmsg(s1) // = sk_prot->sendmsg tcp_bpf_send_verdict(s1) // __SK_REDIRECT caso tcp_bpf_sendmsg_redir(s2) tcp_bpf_push_locked(s2) tcp_bpf_push(s2) tcp_rate_check_ app_limited(s2) // espera tcp_sock tcp_sendmsg_locked(s2 ) // \u00eddem Hay una suposici\u00f3n codificada en la cadena de llamadas de que el socket de salida (s2) es un socket TCP. Sin embargo, en el commit 122e6c79efe1 (\"sock_map: Actualizar comprobaciones de tipo de calcet\u00edn para UDP\") hemos habilitado redirecciones a sockets que no son TCP. Esto se hizo por el bien de los programas BPF sk_skb. No hab\u00eda ninguna sangr\u00eda para admitir el caso de uso de env\u00edo a salida de sk_msg. Como resultado, los intentos de env\u00edo a salida a trav\u00e9s de un socket que no es TCP provocan un bloqueo debido a una conversi\u00f3n no v\u00e1lida de sock a tcp_sock: ERROR: desreferencia del puntero NULL del n\u00facleo, direcci\u00f3n: 0000000000000002f... Seguimiento de llamadas: . mostrar_regs+0x60/0x70? __die+0x1f/0x70 ? page_fault_oops+0x80/0x160? do_user_addr_fault+0x2d7/0x800? rcu_is_watching+0x11/0x50? exc_page_fault+0x70/0x1c0? asm_exc_page_fault+0x27/0x30? tcp_tso_segs+0x14/0xa0 tcp_write_xmit+0x67/0xce0 __tcp_push_pending_frames+0x32/0xf0 tcp_push+0x107/0x140 tcp_sendmsg_locked+0x99f/0xbb0 tcp_bpf_push+0x19d/0x3a0 tcp_bpf_sendmsg_redir+0x55/0xd0 tcp_bpf_send_verdict+0x407/0x550 tcp_bpf_sendmsg+0x1a1/0x390 inet_sendmsg+0x6a/0x70 sock_sendmsg+0x9d/0xc0? sockfd_lookup_light+0x12/0x80 __sys_sendto+0x10e/0x160 ? syscall_enter_from_user_mode+0x20/0x60? __this_cpu_preempt_check+0x13/0x20? lockdep_hardirqs_on+0x82/0x110 __x64_sys_sendto+0x1f/0x30 do_syscall_64+0x38/0x90 Entry_SYSCALL_64_after_hwframe+0x63/0xcd Rechace la selecci\u00f3n de sockets que no sean TCP como destino de redireccionamiento desde un programa BPF sk_msg para evitar el bloqueo. Cuando lo intente, el usuario recibir\u00e1 un error EACCES de la llamada al sistema send/sendto/sendmsg()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13",
"versionEndExcluding": "5.15.135",
"matchCriteriaId": "0988674C-BFC5-4018-840B-F6E3C9B45A62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.57",
"matchCriteriaId": "8629E5D1-351D-4D4B-8D05-E10BD4A1CFD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.5.7",
"matchCriteriaId": "830A824C-F212-4FDC-ADEF-0EBEC6B2365B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "00AB783B-BE05-40E8-9A55-6AA457D95031"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/b80e31baa43614e086a9d29dc1151932b1bd7fc5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b8f97e47b6fb84fcf2f5a22e725eefb6cf5070c2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bc8b89b6963803a123f64aa9494155a037b3d728",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ded6e448028f0f91b6af35985afca01fa02a9089",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b80e31baa43614e086a9d29dc1151932b1bd7fc5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b8f97e47b6fb84fcf2f5a22e725eefb6cf5070c2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bc8b89b6963803a123f64aa9494155a037b3d728",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ded6e448028f0f91b6af35985afca01fa02a9089",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52524",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-02T22:15:48.263",
"lastModified": "2024-11-21T08:39:57.813",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T20:00:51.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,55 +15,193 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: nfc: llcp: Agregar bloqueo al modificar la lista de dispositivos La lista de dispositivos necesita mantener su bloqueo asociado al modificarla, o la lista podr\u00eda corromperse, como descubri\u00f3 syzbot."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.251",
"versionEndExcluding": "5.4.258",
"matchCriteriaId": "CEF23E2F-2D7D-429D-9A9D-3C3037DDF337"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.188",
"versionEndExcluding": "5.10.198",
"matchCriteriaId": "7BF9EEBD-3033-41C3-9E3C-16AFB9AF75A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.121",
"versionEndExcluding": "5.15.135",
"matchCriteriaId": "C2FDE0B2-2B57-44AB-9D8B-CB4E865DEB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.39",
"versionEndExcluding": "6.1.57",
"matchCriteriaId": "52806B93-9F14-4809-8A4B-10AC41AC10D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5",
"versionEndExcluding": "6.5.7",
"matchCriteriaId": "237658B4-9F55-44A1-8440-9BFCDD0E6390"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "00AB783B-BE05-40E8-9A55-6AA457D95031"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/191d87a19cf1005ecf41e1ae08d74e17379e8391",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/29c16c2bf5866326d5fbc4a537b3997fcac23391",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4837a192f6d06d5bb2f3f47d6ce5353ab69bf86b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7562780e32b84196731d57dd24563546fcf6d082",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dba849cc98113b145c6e720122942c00b8012bdb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dfc7f7a988dad34c3bf4c053124fb26aa6c5f916",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/191d87a19cf1005ecf41e1ae08d74e17379e8391",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/29c16c2bf5866326d5fbc4a537b3997fcac23391",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4837a192f6d06d5bb2f3f47d6ce5353ab69bf86b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7562780e32b84196731d57dd24563546fcf6d082",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dba849cc98113b145c6e720122942c00b8012bdb",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dfc7f7a988dad34c3bf4c053124fb26aa6c5f916",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52525",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-02T22:15:48.313",
"lastModified": "2024-11-21T08:39:57.940",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T20:04:04.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,71 +15,209 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mwifiex: corrige la condici\u00f3n de verificaci\u00f3n de oob en mwifiex_process_rx_packet Solo omita la ruta del c\u00f3digo al intentar acceder a los encabezados rfc1042 cuando el b\u00fafer sea demasiado peque\u00f1o, para que el controlador a\u00fan pueda procesar paquetes sin encabezados rfc1042 ."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.195",
"versionEndExcluding": "5.10.198",
"matchCriteriaId": "473AE17D-E000-42E4-8762-8669D7D816A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.132",
"versionEndExcluding": "5.15.135",
"matchCriteriaId": "227A22A5-7242-489E-9B0A-D42858962A3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.53",
"versionEndExcluding": "6.1.57",
"matchCriteriaId": "9EFECC3D-19B3-431A-B85F-A2926E5DEAD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5.3",
"versionEndExcluding": "6.5.7",
"matchCriteriaId": "E413C8D4-78D9-4BA2-AA27-C686E4D65A09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:4.14.326:*:*:*:*:*:*:*",
"matchCriteriaId": "7D69FD12-238F-4D96-8520-4C77E2B6FB85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:4.19.295:*:*:*:*:*:*:*",
"matchCriteriaId": "67A9EA15-10FD-4821-99DA-139F28267AF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.4.257:*:*:*:*:*:*:*",
"matchCriteriaId": "66DC852D-D687-42FE-B337-455473C3ADFB"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/10a18c8bac7f60d32b7af22da03b66f350beee38",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/16cc18b9080892d1a0200a38e36ae52e464bc555",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5afb996349cb6d1f14d6ba9aaa7aed3bd82534f6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6b706286473db4fd54b5f869faa67f4a8cb18e99",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/71b1d2b57f145c8469aa9346f0fd57bf59b2b89c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aef7a0300047e7b4707ea0411dc9597cba108fc8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b8e260654a29de872e7cb85387d8ab8974694e8e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/be2ff39b1504c5359f4a083c1cfcad21d666e216",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/10a18c8bac7f60d32b7af22da03b66f350beee38",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/16cc18b9080892d1a0200a38e36ae52e464bc555",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5afb996349cb6d1f14d6ba9aaa7aed3bd82534f6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6b706286473db4fd54b5f869faa67f4a8cb18e99",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/71b1d2b57f145c8469aa9346f0fd57bf59b2b89c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aef7a0300047e7b4707ea0411dc9597cba108fc8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b8e260654a29de872e7cb85387d8ab8974694e8e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/be2ff39b1504c5359f4a083c1cfcad21d666e216",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52527",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-02T22:15:48.403",
"lastModified": "2024-11-21T08:39:58.170",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T20:39:56.607",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,71 +15,235 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4, ipv6: se corrigi\u00f3 el manejo de transhdrlen en __ip{,6}_append_data() Incluir el transhdrlen en longitud es un problema cuando el paquete est\u00e1 parcialmente lleno (por ejemplo, algo como enviar(MSG_MORE ) sucedi\u00f3 anteriormente) al agregarlo a un paquete IPv4 o IPv6, ya que no queremos repetir el encabezado de transporte ni contabilizarlo dos veces. Esto puede suceder en algunas circunstancias, como al realizar un empalme en un z\u00f3calo L2TP. El s\u00edntoma observado es una advertencia en __ip6_append_data(): ADVERTENCIA: CPU: 1 PID: 5042 en net/ipv6/ip6_output.c:1800 __ip6_append_data.isra.0+0x1be8/0x47f0 net/ipv6/ip6_output.c:1800 que ocurre cuando MSG_SPLICE_PAGES se utiliza para agregar m\u00e1s datos a un skbuff que ya est\u00e1 parcialmente ocupado. La advertencia se produce cuando 'copiar' es mayor que la cantidad de datos en el iterador del mensaje. Esto se debe a que la longitud solicitada incluye la longitud del encabezado de transporte cuando no deber\u00eda hacerlo. Esto puede desencadenarse, por ejemplo: sfd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_L2TP); enlazar(sfd, ...); // ::1 conectar(sfd, ...); // ::1 puerto 7 enviar(sfd, buffer, 4100, MSG_MORE); enviar archivo (sfd, dfd, NULL, 1024); Solucione este problema agregando solo transhdrlen a la longitud si la cola de escritura est\u00e1 vac\u00eda en l2tp_ip6_sendmsg(), de manera an\u00e1loga a c\u00f3mo hace las cosas UDP. Parece que l2tp_ip_sendmsg() no sufrir\u00e1 este problema ya que construye el paquete UDP por s\u00ed mismo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.5",
"versionEndExcluding": "4.14.327",
"matchCriteriaId": "CC009A79-D1F2-492D-AC37-5EF2DECD6C54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.296",
"matchCriteriaId": "78DAD65C-4893-461B-91B2-F4E7C212F140"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.258",
"matchCriteriaId": "1208C905-CEAA-49F2-B357-72A5185B2656"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.198",
"matchCriteriaId": "66D916C3-4087-44FF-9CD9-D2826BCC9E3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.135",
"matchCriteriaId": "53447712-3158-498E-A077-9FA1898E6464"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.57",
"matchCriteriaId": "8629E5D1-351D-4D4B-8D05-E10BD4A1CFD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.5.7",
"matchCriteriaId": "830A824C-F212-4FDC-ADEF-0EBEC6B2365B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "00AB783B-BE05-40E8-9A55-6AA457D95031"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1fc793d68d50dee4782ef2e808913d5dd880bcc6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/559d697c5d072593d22b3e0bd8b8081108aeaf59",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7626b9fed53092aa2147978070e610ecb61af844",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/96b2e1090397217839fcd6c9b6d8f5d439e705ed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9d4c75800f61e5d75c1659ba201b6c0c7ead3070",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cd1189956393bf850b2e275e37411855d3bd86bb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f6a7182179c0ed788e3755ee2ed18c888ddcc33f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fe80658c08e3001c80c5533cd41abfbb0e0e28fd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1fc793d68d50dee4782ef2e808913d5dd880bcc6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/559d697c5d072593d22b3e0bd8b8081108aeaf59",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7626b9fed53092aa2147978070e610ecb61af844",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/96b2e1090397217839fcd6c9b6d8f5d439e705ed",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9d4c75800f61e5d75c1659ba201b6c0c7ead3070",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cd1189956393bf850b2e275e37411855d3bd86bb",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f6a7182179c0ed788e3755ee2ed18c888ddcc33f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fe80658c08e3001c80c5533cd41abfbb0e0e28fd",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52718",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-12-28T08:15:04.797",
"lastModified": "2024-12-28T08:15:04.797",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T20:50:13.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
@ -49,12 +69,297 @@
"value": "CWE-420"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:pt9030-15_firmware:3.0.3.266:*:*:*:*:*:*:*",
"matchCriteriaId": "6448BB89-9B6D-4AFD-9E28-23EB03C4AA52"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:pt9030-15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C168F352-DFCD-45F6-AA6D-FFFFE1840FE2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:ws7206-10_firmware:11.0.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "68FA3E83-1970-4500-B3B5-E2F68E178487"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:ws7206-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8153CF45-E1C2-4355-8E99-12B3321A3C28"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:ws7206-10_firmware:2.1.0.203:*:*:*:*:*:*:*",
"matchCriteriaId": "E88C36C8-E477-49AC-9A23-1BE6C87525DE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:ws7206-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8153CF45-E1C2-4355-8E99-12B3321A3C28"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:ws7290-15_firmware:3.0.3.266:*:*:*:*:*:*:*",
"matchCriteriaId": "B9863510-CCE9-47A6-AE6F-B841BE97EC11"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:ws7290-15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "318B5B11-EB95-4729-95BA-603AE2A6821B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:ws8000-10_firmware:3.0.3.236:*:*:*:*:*:*:*",
"matchCriteriaId": "CB91CA3A-6D93-4580-8142-56EFCE325A7A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:ws8000-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "308EC09B-A09D-47A3-8654-F90D80F82100"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:ws8001-10_firmware:3.0.3.242:*:*:*:*:*:*:*",
"matchCriteriaId": "EC637316-8BDD-45D8-ABD0-C7B5A3E9E585"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:ws8001-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC2333EB-3BA5-4EE5-A88A-68A97912F6E0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:ws8002-10_firmware:3.0.3.242:*:*:*:*:*:*:*",
"matchCriteriaId": "E55857B5-BDFC-4A8E-A9FD-5509EE05217B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:ws8002-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "177AB0ED-0F61-4345-AA36-E5690CEB6712"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:ws8500-10_firmware:3.0.3.235:*:*:*:*:*:*:*",
"matchCriteriaId": "1FD6B7EB-6D3B-4F1B-A021-474333435A92"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:ws8500-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6603C16-0A98-4EBE-91AC-C0C74DAD6EA8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:ws8502-10_firmware:3.0.3.242:*:*:*:*:*:*:*",
"matchCriteriaId": "858AFE8C-826B-401F-BA0C-445E5B287770"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:ws8502-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16A0BCD5-3293-4860-8B6A-7C224D350223"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:ws8700-10_firmware:3.0.3.251:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EB4588-7370-4743-A262-62BBC62C92DB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:ws8700-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6796317F-F4C4-48F8-8495-1AEB2DECFB20"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/br/psirt/security-advisories/2024/huawei-sa-chvishhr-d50dedde-en",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52953",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:07.990",
"lastModified": "2025-01-08T03:15:07.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T19:08:57.217",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
@ -49,12 +69,62 @@
"value": "CWE-22"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52954",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:08.130",
"lastModified": "2025-01-08T03:15:08.130",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T19:09:19.737",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,12 +69,67 @@
"value": "CWE-701"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52955",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:08.263",
"lastModified": "2025-01-08T03:15:08.263",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T19:09:36.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,12 +69,67 @@
"value": "CWE-264"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7266",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-12-28T07:15:19.967",
"lastModified": "2024-12-28T07:15:19.967",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T20:48:22.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
@ -49,12 +69,108 @@
"value": "CWE-420"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:tc7001-10_firmware:2.0.0.336\\(sp6c300\\):*:*:*:*:*:*:*",
"matchCriteriaId": "34A51E6B-696A-4275-A1CC-18AD400426DF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:tc7001-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "291B8DCD-DE45-4834-8F16-2464EB29FD46"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:ws7200-10_firmware:3.0.3.215:*:*:*:*:*:*:*",
"matchCriteriaId": "633DC6F0-E031-4278-8E0B-41AE975F7DD1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:ws7200-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC813CE-339B-4DB6-9920-D64D185FDDD9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:ws7206-10_firmware:4.0.0.16\\(v3r2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9A6C0416-F770-415C-9013-332A61E4D358"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:ws7206-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8153CF45-E1C2-4355-8E99-12B3321A3C28"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-chvishhr-d616b19e-en",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-12587",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-11T06:15:25.070",
"lastModified": "2025-01-11T06:15:25.070",
"lastModified": "2025-01-13T20:15:27.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Contact Form Master WordPress plugin through 1.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
},
{
"lang": "es",
"value": "El complemento Contact Form Master de WordPress hasta la versi\u00f3n 1.0.7 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un error de Cross Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/7cb040f5-d154-48ea-a54e-80451054bad8/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26709",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T15:15:53.440",
"lastModified": "2024-11-21T09:02:53.617",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-13T20:03:28.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,109 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/iommu: corrige el iommu_group_put() que falta durante la conexi\u00f3n del dominio de la plataforma. Falta la funci\u00f3n spapr_tce_platform_iommu_attach_dev() para llamar a iommu_group_put() cuando el dominio ya est\u00e1 configurado. Esta fuga de recuento aparece con BUG_ON() durante la operaci\u00f3n de eliminaci\u00f3n de DLPAR como: KernelBug: Error del kernel en estado 'Ninguno': ERROR del kernel en arch/powerpc/platforms/pseries/iommu.c:100. Vaya: Excepci\u00f3n en modo kernel, sign: 5 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries Nombre de hardware: IBM,9080-HEX POWER10 (sin formato) 0x800200 0xf000006 of:IBM,FW1060. 00 (NH1060_016) hv:phyp pSeries NIP: c0000000000ff4d4 LR: c0000000000ff4cc CTR: 0000000000000000 REGS: c0000013aed5f840 TRAP: 0700 Contaminado: GI (6.8.0-rc3-autotest-g9 9bd3cb0d12e) MSR: 8000000000029033 CR: 44002402 XER: 20040000 CFAR: c000000000a0d170 IRQMASK: 0 ... NIP iommu_reconfig_notifier+0x94/0x200 LR iommu_reconfig_notifier+0x8c/0x200 Seguimiento de llamadas: iommu_reconfig_notifier+0x8c/0x2 00 (no confiable) notifier_call_chain+0xb8/0x19c blocking_notifier_call_chain+ 0x64/0x98 of_reconfig_notify+0x44/0xdc of_detach_node+0x78/0xb0 ofdt_write.part.0+0x86c/0xbb8 proc_reg_write+0xf4/0x150 vfs_write+0xf8/0x488 ksys_write+0x84/0x140 system_call_exception+0x1 38/0x330 system_call_vectored_common+0x15c/0x2ec El parche agrega la llamada faltante a iommu_group_put()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.6",
"matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0846dd77c8349ec92ca0079c9c71d130f34cb192",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c90fdea9cac9eb419fc266e75d625cb60c8f7f6c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0846dd77c8349ec92ca0079c9c71d130f34cb192",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c90fdea9cac9eb419fc266e75d625cb60c8f7f6c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-44771",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T19:15:10.670",
"lastModified": "2025-01-13T19:15:10.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BigId PrivacyPortal v179 is vulnerable to Cross Site Scripting (XSS) via the \"Label\" field in the Report template function."
}
],
"metrics": {},
"references": [
{
"url": "https://bigid.com/privacy/privacy-portal-app/",
"source": "cve@mitre.org"
},
{
"url": "https://www.appgate.com/blog/cross-site-scripting-xss-in-bigid-privacy-portal",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-46310",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T19:15:10.803",
"lastModified": "2025-01-13T19:15:10.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Access Control in Cfx.re FXServer v9601 and earlier allows unauthenticated users to modify and read arbitrary user data via exposed API endpoint"
}
],
"metrics": {},
"references": [
{
"url": "http://cfxre.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/PRX5Y/CVE-2024-46310",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-46480",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T20:15:28.147",
"lastModified": "2025-01-13T20:15:28.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An NTLM hash leak in Venki Supravizio BPM up to 18.0.1 allows authenticated attackers with Application Administrator access to escalate privileges on the underlying host system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://github.com/Lorenzo-de-Sa/Vulnerability-Research",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Lorenzo-de-Sa/Vulnerability-Research/blob/main/CVE-2024-46480.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.venki.com.br/ferramenta-bpm/supravizio/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-46481",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T20:15:28.300",
"lastModified": "2025-01-13T20:15:28.300",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The login page of Venki Supravizio BPM up to 18.1.1 is vulnerable to open redirect leading to reflected XSS."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/Lorenzo-de-Sa/Vulnerability-Research",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Lorenzo-de-Sa/Vulnerability-Research/blob/main/CVE-2024-46481.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.venki.com.br/ferramenta-bpm/supravizio/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46919",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T17:15:16.833",
"lastModified": "2025-01-13T17:15:16.833",
"lastModified": "2025-01-13T20:15:28.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue was discovered in Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 850, 1080, 2100, and 1280. Lack of a length check leads to a stack out-of-bounds write at loadOutputBuffers."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46920",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T18:15:18.517",
"lastModified": "2025-01-13T18:15:18.517",
"lastModified": "2025-01-13T20:15:28.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue was discovered in Samsung Mobile Processor Exynos 9820, 9825, 980, 990, 850, 1080, 2100, and 1280. Lack of a length check leads to a stack out-of-bounds write at loadInputBuffers."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-46921",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T19:15:10.903",
"lastModified": "2025-01-13T19:15:10.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung Mobile Processor and Modem Exynos 9820, 9825, 980, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W1000, Modem 5123, Modem 5300, Modem 5400. UE does not limit the number of attempts for the RRC Setup procedure in the 5G SA, leading to a denial of service (battery-drain attack)."
}
],
"metrics": {},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-46921/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48883",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T17:15:16.947",
"lastModified": "2025-01-13T17:15:16.947",
"lastModified": "2025-01-13T20:15:28.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, and Modem 5300. The UE incorrectly handles a malformed uplink scheduling message, resulting in an information leak of the UE."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-52935",
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"published": "2025-01-13T11:15:08.743",
"lastModified": "2025-01-13T11:15:08.743",
"lastModified": "2025-01-13T19:15:10.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory."
},
{
"lang": "es",
"value": "El software del kernel instalado y ejecut\u00e1ndose dentro de una m\u00e1quina virtual invitada puede explotar la memoria compartida con el firmware de la GPU para escribir datos fuera de la memoria de la GPU virtualizada del invitado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.7,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53204",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T14:15:28.207",
"lastModified": "2024-12-27T14:15:28.207",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-13T19:51:04.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: phy: realtek: usb: corregir deref NULL en rtk_usb3phy_probe En rtk_usb3phy_probe(), devm_kzalloc() puede devolver NULL, pero este valor devuelto no se comprueba."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.11.11",
"matchCriteriaId": "08BD273C-E55F-4F15-94F5-1BF716749C15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.12",
"versionEndExcluding": "6.12.2",
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/48d52d3168749e10c1c37cd4ceccd18625851741",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/776f13ad1f88485206f1dca5ef138553106950e5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bf373d2919d98f3d1fe1b19a0304f72fe74386d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54120",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:08.707",
"lastModified": "2025-01-08T03:15:08.707",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T19:27:15.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
@ -49,12 +69,42 @@
"value": "CWE-362"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54687",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-10T18:15:22.630",
"lastModified": "2025-01-10T18:15:22.630",
"lastModified": "2025-01-13T20:15:28.927",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vtiger CRM v.6.1 and before is vulnerable to Cross Site Scripting (XSS) via the Documents module and function uploadAndSaveFile in CRMEntity.php."
},
{
"lang": "es",
"value": "Vtiger CRM v.6.1 y anteriores son vulnerables a Cross Site Scripting (XSS) a trav\u00e9s del m\u00f3dulo Documentos y la funci\u00f3n uploadAndSaveFile en CRMEntity.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://andrea0.medium.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56437",
"sourceIdentifier": "psirt@huawei.com",
"published": "2025-01-08T03:15:08.840",
"lastModified": "2025-01-08T03:15:08.840",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-13T19:27:34.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,12 +69,42 @@
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "964ED670-F38F-4CFA-B689-4A712ECDAAB6"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2025/1/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56704",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-28T10:15:18.817",
"lastModified": "2024-12-28T10:15:18.817",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-13T19:55:28.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,43 +15,173 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: 9p/xen: se corrige la liberaci\u00f3n de IRQ. Los registros del kernel indican que se liber\u00f3 una IRQ dos veces. Se pasa la identificaci\u00f3n del dispositivo correcta durante la liberaci\u00f3n de IRQ. [Dominique: se elimina la variable confusa que se restablece a 0]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.12",
"versionEndExcluding": "4.19.325",
"matchCriteriaId": "D82AB67D-EDD6-4051-90A4-E9E2918056A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.287",
"matchCriteriaId": "E4B15788-D35E-4E5B-A9C0-070AE3729B34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.231",
"matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.174",
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.120",
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.64",
"matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.11",
"matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.12",
"versionEndExcluding": "6.12.2",
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2bb3ee1bf237557daea1d58007d2e1d4a6502ccf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4950408793b118cb8075bcee1f033b543fb719fa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/530bc9f03a102fac95b07cda513bfc16ff69e0ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/692eb06703afc3e24d889d77e94a0e20229f6a4a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7f5a2ed5c1810661e6b03f5a4ebf17682cdea850",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b9e26059664bd9ebc64a0e8f5216266fc9f84265",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d74b4b297097bd361b8a9abfde9b521ff464ea9c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d888f5f5d76b2722c267e6bdf51d445d60647b7b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e43c608f40c065b30964f0a806348062991b802d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57487",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T17:15:17.160",
"lastModified": "2025-01-13T17:15:17.160",
"lastModified": "2025-01-13T20:15:29.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In Code-Projects Online Car Rental System 1.0, the file upload feature does not validate file extensions or MIME types allowing an attacker to upload a PHP shell without any restrictions and execute commands on the server."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/online-car-rental-using-php-source-code/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57488",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T17:15:17.263",
"lastModified": "2025-01-13T17:15:17.263",
"lastModified": "2025-01-13T20:15:29.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Code-Projects Online Car Rental System 1.0 is vulnerable to Cross Site Scripting (XSS) via the vehicalorcview parameter in /admin/edit-vehicle.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/online-car-rental-using-php-source-code/",

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-0405",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-13T01:15:07.430",
"lastModified": "2025-01-13T01:15:07.430",
"lastModified": "2025-01-13T19:15:11.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in liujianview gymxmjpa 1.0 and classified as critical. This issue affects the function GoodsDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/GoodsController.java. The manipulation of the argument goodsName leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en liujianview gymxmjpa 1.0 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a la funci\u00f3n GoodsDaoImpl del archivo src/main/java/com/liujian/gymxmjpa/controller/GoodsController.java. La manipulaci\u00f3n del argumento goodsName conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,14 @@
{
"url": "https://vuldb.com/?submit.473411",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/liujianview/gymxmjpa/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
},
{
"url": "https://github.com/liujianview/gymxmjpa/issues/3#issue-2765770918",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-22142",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-13T20:15:29.677",
"lastModified": "2025-01-13T20:15:29.677",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NamelessMC is a free, easy to use & powerful website software for Minecraft servers. In affected versions an admin can add the ability to have users fill out an additional field and users can inject javascript code into it that would be activated once a staffer visits the user's profile on staff panel. As a result an attacker can execute javascript code on the staffer's computer. This issue has been addressed in version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/NamelessMC/Nameless/releases/tag/v2.1.3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/NamelessMC/Nameless/security/advisories/GHSA-9q22-w64p-g8qm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-22144",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-13T20:15:29.817",
"lastModified": "2025-01-13T20:15:29.817",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NamelessMC is a free, easy to use & powerful website software for Minecraft servers. A user with admincp.core.emails or admincp.users.edit permissions can validate users and an attacker can reset their password. When the account is successfully approved by email the reset code is NULL, but when the account is manually validated by a user with admincp.core.emails or admincp.users.edit permissions then the reset_code will no longer be NULL but empty. An attacker can request http://localhost/nameless/index.php?route=/forgot_password/&c= and reset the password. As a result an attacker may compromise another users password and take over their account. This issue has been addressed in release version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-610"
}
]
}
],
"references": [
{
"url": "https://github.com/NamelessMC/Nameless/releases/tag/v2.1.3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/NamelessMC/Nameless/security/advisories/GHSA-p883-7496-x35p",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-22828",
"sourceIdentifier": "security@apache.org",
"published": "2025-01-13T13:16:12.233",
"lastModified": "2025-01-13T18:15:22.143",
"lastModified": "2025-01-13T19:15:11.373",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,6 +55,10 @@
{
"url": "https://lists.apache.org/thread/bbsm9fdwrgfyostzojh6ghpocgdmx8rs",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/01/13/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-23026",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-13T20:15:30.003",
"lastModified": "2025-01-13T20:15:30.003",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "jte (Java Template Engine) is a secure and lightweight template engine for Java and Kotlin. In affected versions Jte HTML templates with `script` tags or script attributes that include a Javascript template string (backticks) are subject to XSS. The `javaScriptBlock` and `javaScriptAttribute` methods in the `Escape` class do not escape backticks, which are used for Javascript template strings. Dollar signs in template strings should also be escaped as well to prevent undesired interpolation. HTML templates rendered by Jte's `OwaspHtmlTemplateOutput` in versions less than or equal to `3.1.15` with `script` tags or script attributes that contain Javascript template strings (backticks) are vulnerable. Users are advised to upgrade to version 3.1.16 or later to resolve this issue. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-150"
}
]
}
],
"references": [
{
"url": "https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Template_literals#description",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/casid/jte/blob/main/jte-runtime/src/main/java/gg/jte/html/escape/Escape.java#L43-L83",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/casid/jte/security/advisories/GHSA-vh22-6c6h-rm8q",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-23027",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-13T20:15:30.150",
"lastModified": "2025-01-13T20:15:30.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "next-forge is a Next.js project boilerplate for modern web application. The BASEHUB_TOKEN commited in apps/web/.env.example. Users should avoid use of this token and should remove any access it may have in their systems."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"references": [
{
"url": "https://github.com/haydenbleasel/next-forge/commit/239a98f2c308a51d626ae0613102917f82603c1c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/haydenbleasel/next-forge/security/advisories/GHSA-wppx-qmqh-9h33",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-23078",
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
"published": "2025-01-10T18:15:26.877",
"lastModified": "2025-01-10T18:15:26.877",
"lastModified": "2025-01-13T19:15:11.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - Breadcrumbs2 extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Breadcrumbs2 extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.5, from 1.42.X before 1.42.4."
},
{
"lang": "es",
"value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Wikimedia Foundation Mediawiki - Breadcrumbs2 extension que permite Cross-Site Scripting (XSS). Este problema afecta a la extensi\u00f3n Mediawiki - Breadcrumbs2: desde 1.39.X hasta 1.39.11, desde 1.41.X hasta 1.41.5, desde 1.42.X hasta 1.42.4."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-13T19:00:20.501346+00:00
2025-01-13T21:00:21.256051+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-13T18:58:56.063000+00:00
2025-01-13T20:50:13.847000+00:00
```
### Last Data Feed Release
@ -33,54 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
276866
276875
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `9`
- [CVE-2024-12211](CVE-2024/CVE-2024-122xx/CVE-2024-12211.json) (`2025-01-13T17:15:16.243`)
- [CVE-2024-46479](CVE-2024/CVE-2024-464xx/CVE-2024-46479.json) (`2025-01-13T18:15:18.003`)
- [CVE-2024-46919](CVE-2024/CVE-2024-469xx/CVE-2024-46919.json) (`2025-01-13T17:15:16.833`)
- [CVE-2024-46920](CVE-2024/CVE-2024-469xx/CVE-2024-46920.json) (`2025-01-13T18:15:18.517`)
- [CVE-2024-48883](CVE-2024/CVE-2024-488xx/CVE-2024-48883.json) (`2025-01-13T17:15:16.947`)
- [CVE-2024-54999](CVE-2024/CVE-2024-549xx/CVE-2024-54999.json) (`2025-01-13T17:15:17.057`)
- [CVE-2024-5743](CVE-2024/CVE-2024-57xx/CVE-2024-5743.json) (`2025-01-13T18:15:19.517`)
- [CVE-2024-57487](CVE-2024/CVE-2024-574xx/CVE-2024-57487.json) (`2025-01-13T17:15:17.160`)
- [CVE-2024-57488](CVE-2024/CVE-2024-574xx/CVE-2024-57488.json) (`2025-01-13T17:15:17.263`)
- [CVE-2024-6352](CVE-2024/CVE-2024-63xx/CVE-2024-6352.json) (`2025-01-13T17:15:17.367`)
- [CVE-2024-44771](CVE-2024/CVE-2024-447xx/CVE-2024-44771.json) (`2025-01-13T19:15:10.670`)
- [CVE-2024-46310](CVE-2024/CVE-2024-463xx/CVE-2024-46310.json) (`2025-01-13T19:15:10.803`)
- [CVE-2024-46480](CVE-2024/CVE-2024-464xx/CVE-2024-46480.json) (`2025-01-13T20:15:28.147`)
- [CVE-2024-46481](CVE-2024/CVE-2024-464xx/CVE-2024-46481.json) (`2025-01-13T20:15:28.300`)
- [CVE-2024-46921](CVE-2024/CVE-2024-469xx/CVE-2024-46921.json) (`2025-01-13T19:15:10.903`)
- [CVE-2025-22142](CVE-2025/CVE-2025-221xx/CVE-2025-22142.json) (`2025-01-13T20:15:29.677`)
- [CVE-2025-22144](CVE-2025/CVE-2025-221xx/CVE-2025-22144.json) (`2025-01-13T20:15:29.817`)
- [CVE-2025-23026](CVE-2025/CVE-2025-230xx/CVE-2025-23026.json) (`2025-01-13T20:15:30.003`)
- [CVE-2025-23027](CVE-2025/CVE-2025-230xx/CVE-2025-23027.json) (`2025-01-13T20:15:30.150`)
### CVEs modified in the last Commit
Recently modified CVEs: `38`
Recently modified CVEs: `39`
- [CVE-2023-52480](CVE-2023/CVE-2023-524xx/CVE-2023-52480.json) (`2025-01-13T17:05:39.887`)
- [CVE-2023-52482](CVE-2023/CVE-2023-524xx/CVE-2023-52482.json) (`2025-01-13T18:27:10.853`)
- [CVE-2023-52483](CVE-2023/CVE-2023-524xx/CVE-2023-52483.json) (`2025-01-13T17:53:05.157`)
- [CVE-2023-52499](CVE-2023/CVE-2023-524xx/CVE-2023-52499.json) (`2025-01-13T18:29:52.097`)
- [CVE-2023-52500](CVE-2023/CVE-2023-525xx/CVE-2023-52500.json) (`2025-01-13T18:43:18.007`)
- [CVE-2023-52501](CVE-2023/CVE-2023-525xx/CVE-2023-52501.json) (`2025-01-13T18:45:17.817`)
- [CVE-2023-52505](CVE-2023/CVE-2023-525xx/CVE-2023-52505.json) (`2025-01-13T18:48:17.593`)
- [CVE-2023-52506](CVE-2023/CVE-2023-525xx/CVE-2023-52506.json) (`2025-01-13T18:49:25.347`)
- [CVE-2023-52507](CVE-2023/CVE-2023-525xx/CVE-2023-52507.json) (`2025-01-13T18:51:41.030`)
- [CVE-2023-52517](CVE-2023/CVE-2023-525xx/CVE-2023-52517.json) (`2025-01-13T18:54:30.323`)
- [CVE-2023-52519](CVE-2023/CVE-2023-525xx/CVE-2023-52519.json) (`2025-01-13T18:57:26.213`)
- [CVE-2024-20342](CVE-2024/CVE-2024-203xx/CVE-2024-20342.json) (`2025-01-13T18:15:17.057`)
- [CVE-2024-47894](CVE-2024/CVE-2024-478xx/CVE-2024-47894.json) (`2025-01-13T18:15:18.693`)
- [CVE-2024-47895](CVE-2024/CVE-2024-478xx/CVE-2024-47895.json) (`2025-01-13T18:15:18.933`)
- [CVE-2024-47897](CVE-2024/CVE-2024-478xx/CVE-2024-47897.json) (`2025-01-13T18:15:19.310`)
- [CVE-2024-5974](CVE-2024/CVE-2024-59xx/CVE-2024-5974.json) (`2025-01-13T18:15:19.697`)
- [CVE-2025-0406](CVE-2025/CVE-2025-04xx/CVE-2025-0406.json) (`2025-01-13T18:15:20.490`)
- [CVE-2025-0407](CVE-2025/CVE-2025-04xx/CVE-2025-0407.json) (`2025-01-13T18:15:21.023`)
- [CVE-2025-0409](CVE-2025/CVE-2025-04xx/CVE-2025-0409.json) (`2025-01-13T18:15:21.430`)
- [CVE-2025-0410](CVE-2025/CVE-2025-04xx/CVE-2025-0410.json) (`2025-01-13T18:15:21.730`)
- [CVE-2025-22777](CVE-2025/CVE-2025-227xx/CVE-2025-22777.json) (`2025-01-13T18:15:22.000`)
- [CVE-2025-22828](CVE-2025/CVE-2025-228xx/CVE-2025-22828.json) (`2025-01-13T18:15:22.143`)
- [CVE-2025-23079](CVE-2025/CVE-2025-230xx/CVE-2025-23079.json) (`2025-01-13T18:15:22.470`)
- [CVE-2025-23108](CVE-2025/CVE-2025-231xx/CVE-2025-23108.json) (`2025-01-13T18:15:22.680`)
- [CVE-2025-23109](CVE-2025/CVE-2025-231xx/CVE-2025-23109.json) (`2025-01-13T18:15:22.903`)
- [CVE-2023-52523](CVE-2023/CVE-2023-525xx/CVE-2023-52523.json) (`2025-01-13T19:57:06.317`)
- [CVE-2023-52524](CVE-2023/CVE-2023-525xx/CVE-2023-52524.json) (`2025-01-13T20:00:51.600`)
- [CVE-2023-52525](CVE-2023/CVE-2023-525xx/CVE-2023-52525.json) (`2025-01-13T20:04:04.813`)
- [CVE-2023-52527](CVE-2023/CVE-2023-525xx/CVE-2023-52527.json) (`2025-01-13T20:39:56.607`)
- [CVE-2023-52718](CVE-2023/CVE-2023-527xx/CVE-2023-52718.json) (`2025-01-13T20:50:13.847`)
- [CVE-2023-52953](CVE-2023/CVE-2023-529xx/CVE-2023-52953.json) (`2025-01-13T19:08:57.217`)
- [CVE-2023-52954](CVE-2023/CVE-2023-529xx/CVE-2023-52954.json) (`2025-01-13T19:09:19.737`)
- [CVE-2023-52955](CVE-2023/CVE-2023-529xx/CVE-2023-52955.json) (`2025-01-13T19:09:36.110`)
- [CVE-2023-7266](CVE-2023/CVE-2023-72xx/CVE-2023-7266.json) (`2025-01-13T20:48:22.750`)
- [CVE-2024-12587](CVE-2024/CVE-2024-125xx/CVE-2024-12587.json) (`2025-01-13T20:15:27.283`)
- [CVE-2024-26709](CVE-2024/CVE-2024-267xx/CVE-2024-26709.json) (`2025-01-13T20:03:28.797`)
- [CVE-2024-46919](CVE-2024/CVE-2024-469xx/CVE-2024-46919.json) (`2025-01-13T20:15:28.450`)
- [CVE-2024-46920](CVE-2024/CVE-2024-469xx/CVE-2024-46920.json) (`2025-01-13T20:15:28.613`)
- [CVE-2024-48883](CVE-2024/CVE-2024-488xx/CVE-2024-48883.json) (`2025-01-13T20:15:28.770`)
- [CVE-2024-52935](CVE-2024/CVE-2024-529xx/CVE-2024-52935.json) (`2025-01-13T19:15:10.993`)
- [CVE-2024-53204](CVE-2024/CVE-2024-532xx/CVE-2024-53204.json) (`2025-01-13T19:51:04.787`)
- [CVE-2024-54120](CVE-2024/CVE-2024-541xx/CVE-2024-54120.json) (`2025-01-13T19:27:15.427`)
- [CVE-2024-54687](CVE-2024/CVE-2024-546xx/CVE-2024-54687.json) (`2025-01-13T20:15:28.927`)
- [CVE-2024-56437](CVE-2024/CVE-2024-564xx/CVE-2024-56437.json) (`2025-01-13T19:27:34.937`)
- [CVE-2024-56704](CVE-2024/CVE-2024-567xx/CVE-2024-56704.json) (`2025-01-13T19:55:28.720`)
- [CVE-2024-57487](CVE-2024/CVE-2024-574xx/CVE-2024-57487.json) (`2025-01-13T20:15:29.090`)
- [CVE-2024-57488](CVE-2024/CVE-2024-574xx/CVE-2024-57488.json) (`2025-01-13T20:15:29.240`)
- [CVE-2025-0405](CVE-2025/CVE-2025-04xx/CVE-2025-0405.json) (`2025-01-13T19:15:11.227`)
- [CVE-2025-22828](CVE-2025/CVE-2025-228xx/CVE-2025-22828.json) (`2025-01-13T19:15:11.373`)
- [CVE-2025-23078](CVE-2025/CVE-2025-230xx/CVE-2025-23078.json) (`2025-01-13T19:15:11.540`)
## Download and Usage

View File

@ -152063,17 +152063,17 @@ CVE-2020-18191,0,0,19c56ae3e2117a539ce0ec995b7d09a93e98a8c51ed958bc18b6f0bfa22fb
CVE-2020-18194,0,0,54c713b4f65cc26d43c42b007edc0b4d855084ecf547a1cd30369fa8c8521c58,2024-11-21T05:08:28.907000
CVE-2020-18195,0,0,0060cb677a270d581371d776344f6b9950bdd190d2acbc16b2092c2cd3d548bf,2024-11-21T05:08:29.043000
CVE-2020-18198,0,0,371da80ca3cccdc5d0da8b636ff3e22589e1c4bf74e1b74c12245b968150ecc0,2024-11-21T05:08:29.183000
CVE-2020-1820,0,1,b9886940566ec92786818daf088c0f24cf984de31418cbe3784f70c56e7a10de,2025-01-13T18:40:36.910000
CVE-2020-1821,0,1,7c5548ba45b687588f58c7f56285d1ed4415ed6bcd2133bdfc66d487933003a0,2025-01-13T18:40:31.437000
CVE-2020-1820,0,0,b9886940566ec92786818daf088c0f24cf984de31418cbe3784f70c56e7a10de,2025-01-13T18:40:36.910000
CVE-2020-1821,0,0,7c5548ba45b687588f58c7f56285d1ed4415ed6bcd2133bdfc66d487933003a0,2025-01-13T18:40:31.437000
CVE-2020-18215,0,0,276eef64aa4a8b79b3a46616d24d133865a5ed2bba973c10957013f5507470ac,2024-11-21T05:08:29.320000
CVE-2020-1822,0,1,b186bdf767b198e443d41aaa3f0568281de8e0c24d97797cbda09b08449edd09,2025-01-13T18:40:17.893000
CVE-2020-1822,0,0,b186bdf767b198e443d41aaa3f0568281de8e0c24d97797cbda09b08449edd09,2025-01-13T18:40:17.893000
CVE-2020-18220,0,0,fcadbf12c706c185ba245780ea87b3c85d5c7b487234e5482fa49302b6c3f60b,2024-11-21T05:08:29.460000
CVE-2020-18221,0,0,c828beeb6390a6c9cb50654e2c2b08c43e13791f7c51b611bd9e30e60b2b507f,2024-11-21T05:08:29.610000
CVE-2020-18229,0,0,de9c2971ce3c744dceeb564dc0c669d2d99acde568c9be68f645ea66497b0c74,2024-11-21T05:08:29.760000
CVE-2020-1823,0,1,78688f05bac37c7a383b6fb4e653235eb880ce3304dbcadfa2dea48970d362a8,2025-01-13T18:39:37.540000
CVE-2020-1823,0,0,78688f05bac37c7a383b6fb4e653235eb880ce3304dbcadfa2dea48970d362a8,2025-01-13T18:39:37.540000
CVE-2020-18230,0,0,ebe6a5a6a2698552960b0422ae9d0e50a9d70f16138ca3d85f0e7ad4347f523d,2024-11-21T05:08:29.907000
CVE-2020-18232,0,0,5705461e816b6f6694e9ef2f2718b69a045749e869a3533e3ed5283cd8248b1c,2024-11-21T05:08:30.053000
CVE-2020-1824,0,1,58a8ea64e3ed8a5ec1daebc856765572e8e7f785d09c3ca56b57919941da3c25,2025-01-13T18:39:27.433000
CVE-2020-1824,0,0,58a8ea64e3ed8a5ec1daebc856765572e8e7f785d09c3ca56b57919941da3c25,2025-01-13T18:39:27.433000
CVE-2020-1825,0,0,a942dde46b900514ca47c8e921ccce8d9844cba45eeb3a931cde0bf330b07fb0,2024-11-21T05:11:26.497000
CVE-2020-18259,0,0,b06cdddd0c60b9cb1417c4294714ea460eb7e87371666ba861010dfe792d37cd,2024-11-21T05:08:30.217000
CVE-2020-1826,0,0,9d793ee12c01e44af13c183cf0b2187da1411c3957dcb1f4bfb4e1b041d3db56,2024-11-21T05:11:26.610000
@ -164064,10 +164064,10 @@ CVE-2020-9081,0,0,139ec462eaad02a81df0d28c173666bfaa32c021ae89aee5708babc237e9fe
CVE-2020-9082,0,0,d6a05506574f6256e17dc7ddb7951771587a0da245df28e03ad97d6f33888ce5,2024-12-27T10:15:11.687000
CVE-2020-9083,0,0,3c67ba6c3c22aed2d55188918dc1f94331e35d4b01a5cc2f0a70002dd81e58ff,2024-11-21T05:39:59.550000
CVE-2020-9084,0,0,3fb7e0a38e1ed1b2f47bc2a7d12484efaeacd91f30486ad7c04c91bf9ed38a27,2024-11-21T05:39:59.720000
CVE-2020-9085,0,0,5d6b3b014e60c8545bb72a1f6df32fc2d87f683d70c054b5cb73c2d5b19ad485,2024-12-27T10:15:12.217000
CVE-2020-9086,0,0,f42c35ee65e65225877cbb726ec9053b96f403e3587f18603970d7b51d8fde58,2024-12-27T10:15:12.800000
CVE-2020-9085,0,1,2e0e3874596d9f8cc419da9d7d9823a3a4ecd8d6d696c46ec2b4a7da166c3774,2025-01-13T19:35:55.387000
CVE-2020-9086,0,1,c27ca9c50c41ebe5a8d65925985e5e5332f292aff6a3065e44b4dc252261a6cc,2025-01-13T19:34:15.140000
CVE-2020-9087,0,0,dadbb4b83a4b8ec94abd0f2857ea18ae49acc834c93ab896f9adffcec8c83e15,2024-11-21T05:39:59.873000
CVE-2020-9089,0,1,cf5b86dc242b83b0825d815bda6d425d66a87c85bca5b987222d18b0b4d3af82,2025-01-13T18:58:56.063000
CVE-2020-9089,0,0,cf5b86dc242b83b0825d815bda6d425d66a87c85bca5b987222d18b0b4d3af82,2025-01-13T18:58:56.063000
CVE-2020-9090,0,0,c50b319bf7c060145234fe1c0d5b88dc3689e5efe15671f86e1c19a5ed9f4539,2024-11-21T05:40:00.040000
CVE-2020-9091,0,0,c0385c8aa8379da17e2b5726a0fb14236b220fb1db6fd0b8cafa9ae38198a379,2024-11-21T05:40:00.187000
CVE-2020-9092,0,0,937b27efff0a9ba6560bff8af3ad978c113b9b104bf96f451356a3188f1cd3a7,2024-11-21T05:40:00.350000
@ -164129,11 +164129,11 @@ CVE-2020-9206,0,0,66c8d926ce17a8dceebc323e986b82179d3968495f255e5371bdd3850b6a74
CVE-2020-9207,0,0,fd8fb207bf56a082cb8841446e7ede931b036786be53851cfaa1ba39641b71e1,2024-11-21T05:40:10.117000
CVE-2020-9208,0,0,19d6370a98790b39b434b9bdbf16f1b96172dcb41e7e2e6d2e802ec6da2cc463,2024-11-21T05:40:10.257000
CVE-2020-9209,0,0,718a3425df33701055c363309ab66bac95db4d83dd128a7acf2c699263cf87cf,2024-11-21T05:40:10.383000
CVE-2020-9210,0,1,9675df58b538f3c51e2207eb3caa8a7ae0d32961ff6c3b16376bf7d7f42790bd,2025-01-13T18:57:02.907000
CVE-2020-9211,0,1,f47ed6f32d19c23f0ad6ef15579f9e58d42f926f24404bd791a71efb16f10919,2025-01-13T18:53:58.603000
CVE-2020-9210,0,0,9675df58b538f3c51e2207eb3caa8a7ae0d32961ff6c3b16376bf7d7f42790bd,2025-01-13T18:57:02.907000
CVE-2020-9211,0,0,f47ed6f32d19c23f0ad6ef15579f9e58d42f926f24404bd791a71efb16f10919,2025-01-13T18:53:58.603000
CVE-2020-9212,0,0,ba27fda5a1a83f7c8a9792732635631dbc8f62392155cb4a0ecda41f0eb0c3fe,2024-11-21T05:40:10.563000
CVE-2020-9213,0,0,4cb4f2d9c83e4508a8bf6c989885c005f775d5e8a40a232cc9d6e497bff4cf1e,2024-11-21T05:40:10.703000
CVE-2020-9222,0,1,d0e9667c7c30f63cd0cd5b42ee49ccaf99d71cc52fb2c34c1ccc912713187f77,2025-01-13T18:49:33.693000
CVE-2020-9222,0,0,d0e9667c7c30f63cd0cd5b42ee49ccaf99d71cc52fb2c34c1ccc912713187f77,2025-01-13T18:49:33.693000
CVE-2020-9223,0,0,d2caf95754ffa4f54d6c3a94c77e1a52ce9347d87c8c5ee51ea3d1614f384636,2024-11-21T05:40:11.200000
CVE-2020-9225,0,0,26661ec5a217e1ca10ed2eecb9876148cf698b088c73c9df81306b0ca7e34623,2024-11-21T05:40:11.343000
CVE-2020-9226,0,0,4f4dede2041ff04c7e1bc23d10d200b2e9fe8515e3639ca5f3a2aae5391012cd,2024-11-21T05:40:11.470000
@ -164160,7 +164160,7 @@ CVE-2020-9249,0,0,609764363abccd920effb2bb4981a1b82100be4147729a6eea32d0b2b51486
CVE-2020-9250,0,0,f7f77a70e77b7d3e7da6c17b80f87212212c85455a191473f067bbf159588602,2024-12-20T18:15:23.860000
CVE-2020-9251,0,0,beb705051b54230fec1f0b04aa58d84ce8712d444c3c311bd3fd0ff8818aa691,2024-11-21T05:40:16.453000
CVE-2020-9252,0,0,2e27eed374d3e6d0d74e9cc4bbe3815fab87cc2001c720694ee08405ff819d2a,2024-11-21T05:40:16.590000
CVE-2020-9253,0,0,c03fdd01d3f6287d21fea5d4bfb7c24087a0d72e0c42831213087c295985d4df,2024-12-27T10:15:16.610000
CVE-2020-9253,0,1,12ef099407e8fb757b2e85bfaf4886aad952e0e6ddfd9308becbae31b34d9f0e,2025-01-13T19:38:19.563000
CVE-2020-9254,0,0,8e32c6d6bacd3be7a3f1960e97a7c4a004fc1a8bd60e5faabce33423b1584654,2024-11-21T05:40:16.763000
CVE-2020-9255,0,0,d036c0683a7ba9ea33dd8401b86455b8b032eb429d4f3aae3ba5ce1ac0d45705,2024-11-21T05:40:16.913000
CVE-2020-9256,0,0,6668546b9f3d0474a15fb090ad48c8e6a42fc578072b411e8ed96bf814159430,2024-11-21T05:40:17.043000
@ -187399,7 +187399,7 @@ CVE-2021-47203,0,0,9564d820cb2d93da0a0ae7eda2757d5eef2fa0adaa3776421915d06aab3e5
CVE-2021-47204,0,0,0807d36e06039a60390844a27b9c29f575861e7c311ab45fd65648923120e6f2,2024-11-21T06:35:37.460000
CVE-2021-47205,0,0,18551c172472e25239345747128ada0ccd7cc6fe471b57ef495541cf1516fa26,2024-11-21T06:35:37.577000
CVE-2021-47206,0,0,6c20cc18955b069ca564695979ba4d69e50258ddcc033c348c73d4096f845cb1,2025-01-07T17:12:26.390000
CVE-2021-47207,0,0,d6e7ebba058fbc26c30ff619791823f11271eab1f7f01abbcae995ea6a305b67,2024-11-21T06:35:37.800000
CVE-2021-47207,0,1,be89cb642a87a43cfb086c29deaea9f168d7b93104889775861d4b914bc2974c,2025-01-13T20:42:37.580000
CVE-2021-47208,0,0,0aedc6593001cbe298d9e706064e1d980e47bb2fd7444fd7cad250e7521e5eb1,2024-11-21T06:35:37.923000
CVE-2021-47209,0,0,1536c1bef2c14e12d373ca6bd92154342840694d5f784ecde3999106c390f9bf,2024-11-21T06:35:38.130000
CVE-2021-47210,0,0,6f92e3d2c3c1a5d96775ad98a3288fba55e822f3f6095cf6048826173f313db7,2024-11-21T06:35:38.243000
@ -187517,7 +187517,7 @@ CVE-2021-47321,0,0,921fcc8af7f12123744be42b3a2ba4dd930ac9b98608c2f83dd489392b963
CVE-2021-47322,0,0,3dc7ee4ad2dde4ebc21d7b010403a3fa85239a9262926c7207190f4fa9c5a8f7,2024-11-21T06:35:52.733000
CVE-2021-47323,0,0,633211c6bfdb9dfd1c61a272a06bff1bc021219b77a259623ed56d42817f6c9b,2024-11-21T06:35:52.843000
CVE-2021-47324,0,0,a2ec2dc326c9ec8fc89d4f6bb66519434844384f429a73aeedf7049903a0a0d8,2024-11-21T06:35:53.070000
CVE-2021-47325,0,0,a56adb27b96cd5f78537024f03fefa8460d3b0b03a903a1db0a5de100805ff34,2024-11-21T06:35:53.273000
CVE-2021-47325,0,1,ac820df87fa3f3f9e01d4cb9810af0adc82d9d5144eeedc8eb357cc626ea77a1,2025-01-13T20:04:48.480000
CVE-2021-47326,0,0,b7ba3c55754026190b941538095c847ce61badf3c8de85aaf74b716b0ad04037,2024-05-23T14:15:09.033000
CVE-2021-47327,0,0,94fa64a5ce947d155501b62feb0b7f033c99b992efebda5cfad453b0cfed060d,2024-11-21T06:35:53.417000
CVE-2021-47328,0,0,9f3318e77cb63d19039ba11dde4b887a5fd2c747ffb765f73587e9aeb25b9e1e,2024-12-26T19:52:18.833000
@ -212600,7 +212600,7 @@ CVE-2022-48624,0,0,7d8340193c28814d34deb47e64461c30715aea3f85cdee8a05ab3feef2ca7
CVE-2022-48625,0,0,ad1548e03625a1597bed096d4ae7617552f2279c80077db9d95ac7c5db9b122e,2024-11-21T07:33:38.110000
CVE-2022-48626,0,0,9d4f63da0a918f51b7c85b0ffa7c98eb3b3f0bdfe14eedcb544bde294c904c2d,2024-11-21T07:33:38.317000
CVE-2022-48627,0,0,450773013a86dee085659fbeb135aaa41eee00eb1f2d7ba0c46cf0fcba42ac12,2024-11-21T07:33:38.493000
CVE-2022-48628,0,1,38c6820367758e57858643c90208981922cfb44dfdb56b80c9489f9ea4749b42,2025-01-13T18:26:13.343000
CVE-2022-48628,0,0,38c6820367758e57858643c90208981922cfb44dfdb56b80c9489f9ea4749b42,2025-01-13T18:26:13.343000
CVE-2022-48629,0,0,22ed839ae28d9bc6568331788266afa09b73a958ff038fb89be480fe23017988,2024-11-21T07:33:38.803000
CVE-2022-4863,0,0,d4d829a1beb8e4fd89587644cb89a6f79551c4f0525d6fe5f92668872dbe819d,2024-11-21T07:36:05.650000
CVE-2022-48630,0,0,cc35d21a7ef8def8b0a421e82faaa17c2b13a0616e1a81c5178414600588878e,2024-11-21T07:33:38.930000
@ -212612,7 +212612,7 @@ CVE-2022-48635,0,0,bc742bcda5fe3f51d86129e333f38c25dd591078a136bc3b820e011f54757
CVE-2022-48636,0,0,962ba645cc23077f6c15f60e3f5e6072b075b3fb9f2a1a48ce623b993f24d75d,2024-11-21T07:33:39.763000
CVE-2022-48637,0,0,4c589fcf363271ed2ac45b88ec0b8dd56621a86051947f9406b2bb7350a11cd8,2024-11-21T07:33:39.957000
CVE-2022-48638,0,0,7a36934df459d35a752e9c19975343358bc638b0a6803ab6e929e9511ae19adb,2024-11-21T07:33:40.070000
CVE-2022-48639,0,0,2bf64fdcd67f028c10f8b9e564b4b89ca3aa02bab5ff7a158a3f571c972d4c15,2024-11-21T07:33:40.237000
CVE-2022-48639,0,1,471cb299c2f79b95bf203e1bee3acaec19277c53307a0964cefbae99c7b46ef7,2025-01-13T19:58:08.060000
CVE-2022-4864,0,0,59b15f5eec2180ddfa7ce36526893d26fb614ed7bf416e8ac4ed3714bd6e2186,2024-11-21T07:36:05.780000
CVE-2022-48640,0,0,5e756f70cbddf596ac5b8ae586dd2af870a1a48da17b6fd47eabf03f4ed205b8,2024-11-21T07:33:40.350000
CVE-2022-48641,0,0,99cb3d858a92705b7faa733f64ea99edcf4ba5c00c38154dda248e15af991606,2025-01-07T16:57:26.363000
@ -223076,7 +223076,7 @@ CVE-2023-29516,0,0,e7d5797dca4e594f4b8e85bc38666c27403343cbde62b6c6a9d95fd0c373f
CVE-2023-29517,0,0,3c11b94404f4a92e4b3c25dbc0aa3781e95a467cf2e46541b59890cf2387a3c1,2024-11-21T07:57:13.007000
CVE-2023-29518,0,0,e9cc48a2966af7f6a06be670946fae5212378e99b92948f6625ca044794e9874,2024-11-21T07:57:13.127000
CVE-2023-29519,0,0,8ce270b30bb33b136aeea2b7442ade9058989fe73b0ceff5da2070fc8b8a9b83,2024-11-21T07:57:13.240000
CVE-2023-2952,0,0,034e92a0cc8d2e7ac0dd89a28823b56e0fbf3d72dc5b0ec4c7f361be04172907,2024-11-21T07:59:38.173000
CVE-2023-2952,0,1,9dd24ee556133ec22dfc6d2085307de8cb5f1480e905d75b4d4a25adf9981ffd,2025-01-13T20:15:26.313000
CVE-2023-29520,0,0,7c4a4448ae7177e50867ad26caa48ad748408ea00040f33e93cc7249049a6d6d,2024-11-21T07:57:13.357000
CVE-2023-29521,0,0,ffbe288104b2de8247d99b0fb8566863ec147576a15601fbd8b2fce5b7430cb2,2024-11-21T07:57:13.470000
CVE-2023-29522,0,0,c8df22ce9e69dc8e0ee0a23bf96959ce333a822ce3ca56091c06f1470473eb25,2024-11-21T07:57:13.580000
@ -223186,7 +223186,7 @@ CVE-2023-29723,0,0,303fcea14f09e3d0e64d1a961af341a2b88ba23c47ab885ec21656a91d852
CVE-2023-29724,0,0,b957a3fcc2f908978b34709bccb4beaef482657df33bc886f526eec59e4351ea,2025-01-08T21:15:08.470000
CVE-2023-29725,0,0,ab64230b18916f62d493ac57f81dd5cd07baf6987ff2e6626d94f28801370f14,2025-01-08T21:15:08.740000
CVE-2023-29726,0,0,5edc83c46b4a4e4c7f7af4e90e64c34e867ab2e973eaa6365edabd0821085e67,2024-11-21T07:57:25.623000
CVE-2023-29727,0,1,4294fefbe34dece57b7028bad8ebefd56725bd50d5180d41c9eb35db149357e0,2025-01-13T18:15:13.707000
CVE-2023-29727,0,0,4294fefbe34dece57b7028bad8ebefd56725bd50d5180d41c9eb35db149357e0,2025-01-13T18:15:13.707000
CVE-2023-29728,0,0,043926f080c8d3e9064c12911e23091eaaad5413dd2bc1fed2dd3453938e1577,2024-11-21T07:57:25.900000
CVE-2023-2973,0,0,dcc6e31eb1a2bbb1b3cbc016cb0dcf0406ed5fb05ab3542fb7e75f1ee7b1d41b,2024-11-21T07:59:40.407000
CVE-2023-29731,0,0,51fa4848d3ed6a45174cf42297b7f528367db7604ae27a5d799b2ee807f39778,2024-11-21T07:57:26.047000
@ -223202,8 +223202,8 @@ CVE-2023-2974,0,0,c746759a6ca0635395970574fed5d5670a264deef9f431fdc3e7dfe1c5bf8e
CVE-2023-29740,0,0,7219fc17e52f74bca95604bc7d6e4d1f42004cd4d64b5588b372a75c89ceaca2,2024-11-21T07:57:27.313000
CVE-2023-29741,0,0,e90784f47c2c289ff982cc544d11ad433711f5ab532840da10762f8d338abb5a,2024-11-21T07:57:27.460000
CVE-2023-29742,0,0,5755d4d4b102043a00beb2bb3773aeefbc935c0f3c8702cc62cea9fb5caef696,2024-11-21T07:57:27.597000
CVE-2023-29743,0,0,4e343bfe2c90db6c5c6eae7c79e7bbdbef00ae4d945362466d77b4fdbd049d9d,2024-11-21T07:57:27.740000
CVE-2023-29745,0,0,68e3675b29535613bcb2472df3ab338bd82f6db11be2be773fa63d5dc8c2934c,2024-11-21T07:57:27.887000
CVE-2023-29743,0,1,fe49ba136bbdeffcb69460027f9568da7b00a21cac299a3fbec238c4c61241bc,2025-01-13T20:15:25.387000
CVE-2023-29745,0,1,c542af407c0b2a537989cfcde55db8adff6b748cb69e035f86394be8cd6af792,2025-01-13T20:15:26.130000
CVE-2023-29746,0,0,133c031c39348c96f95d9e43b02a0f81b2e172f555bea6970e402c248a23e4a6,2024-11-21T07:57:28.020000
CVE-2023-29747,0,0,88c4138c3c6db30341461853ba2d3a74af8d00bd54721efb094fd003d9030bfb,2025-01-09T22:15:27.130000
CVE-2023-29748,0,0,3bb616611a42918b2d8d55bbdc2fe5b94fea76d10f8313180c5224af166ba7e2,2025-01-09T18:15:25.667000
@ -223421,7 +223421,7 @@ CVE-2023-30191,0,0,baf991b005d2918b8ace439297debd51f00a880020c2785607144cfbf94e0
CVE-2023-30192,0,0,76ef88ebb30e0eb7a330a15d67abe9acdd9b3732c18c14e5467f80708cef8059,2024-11-21T07:59:52.850000
CVE-2023-30194,0,0,97916a3149d4accd5e7cecee33423a08e2cb7a42bf400ac1c6746cf4b6f8b95a,2024-11-21T07:59:53
CVE-2023-30195,0,0,9f6fd32b889ec86f9e06a9f333ca1033c4dc8bc185606c569140c5f599d8388a,2024-11-21T07:59:53.150000
CVE-2023-30196,0,0,35e6908f97e6789a4dd0c990aeed48d9ed2d41eab1253c4f2dd81675f70e1287,2024-11-21T07:59:53.313000
CVE-2023-30196,0,1,d8afa1205a2ac923a0a6e9d60cd8b3febd3d3155dd6bbfd812d986f0a2f4474f,2025-01-13T20:15:26.557000
CVE-2023-30197,0,0,17f3733ff2a8b5b05caf98b060d2a37a716d0eed944dc24c0593a712b78aa10f,2025-01-09T21:15:23.083000
CVE-2023-30198,0,0,7f1941a7741b63aef8b28984f3b14075b64a8d6f6c8b1538f63f22a90dd6b9ff,2025-01-06T18:15:14.143000
CVE-2023-30199,0,0,1f8ebf4c877c0a722d10dbc9b79130c4fc98833d5f788243279b89d19018db31,2024-11-21T07:59:53.783000
@ -226214,12 +226214,12 @@ CVE-2023-33730,0,0,b4f23543b9c138108da75a03508191752c590ba0289d2c4b2b741b2755c62
CVE-2023-33731,0,0,4e0716e51d797332a35d8cf3e5a52df1f04a68160a9692c084acf7ca25247b33,2025-01-08T20:15:24.840000
CVE-2023-33732,0,0,f39138533032e7e2087c74032650fabd9d1ddfad70653d6ef193b7fe677ec10a,2025-01-10T15:15:13.520000
CVE-2023-33733,0,0,67d14424780e2b2a99fc85cd6e4fd6c08e79d171c16dc23f4a6280281fd3af90,2025-01-08T19:15:30.560000
CVE-2023-33734,0,0,ce9b6222e7c051206355de817b0fb42912304fcb66294482b08488625c37fe80,2024-11-21T08:05:55.107000
CVE-2023-33734,0,1,d793371a8f985d4885e0c9db7d0d6babee9fd2d5f6634c2ccd6934e75f8c33fa,2025-01-13T20:15:26.797000
CVE-2023-33735,0,0,82b8398515bddfd6dac3ee1878395a0fd126fa44bed3eddd90cbd91370e7dcc6,2025-01-10T15:15:13.740000
CVE-2023-33736,0,0,a0b290d78fb1dca7aabc3685aefd378b4a38110eea512d324625e6a3d4a5bc11,2025-01-10T15:15:13.960000
CVE-2023-3374,0,0,72d42166146b7c96e033d869d5f45174a0fbde987009f9ab5e93284a1e30de9b,2024-11-21T08:17:07.770000
CVE-2023-33740,0,0,3287cf2115588e74c8c406328378b87e047ead84082398c251fb05d1f6c6a091,2024-11-21T08:05:55.560000
CVE-2023-33741,0,0,32c5b64c05e138266539951bcf4d9734e53f50d8838681dcaa7b5c3c51629ec2,2024-11-21T08:05:55.710000
CVE-2023-33740,0,1,0d3cb5acd8ce1fb6771aaab7ed63bd4078fa9bebd7dd76b5400bb9b80b40279b,2025-01-13T19:15:09.237000
CVE-2023-33741,0,1,56798fc84b9d3b5f51af1b28c474cd2a62751cf19c512f416fe19f627bf2283a,2025-01-13T19:15:10.213000
CVE-2023-33742,0,0,f85dd65ef5c98d66913323d0d12b231e9374df10f945e44c3dcd86e6b55299a1,2024-11-21T08:05:55.860000
CVE-2023-33743,0,0,983f3c1aa4f6be40ed15ab2c7c310ffbccd5cf2d08e6f97080abd9fca6e72778,2024-11-21T08:05:56.023000
CVE-2023-33744,0,0,6f5dbb519cf2da9fda0db029090d6c6246ba923bbd5601ebe71a839766dd6388,2024-11-21T08:05:56.177000
@ -226540,7 +226540,7 @@ CVE-2023-34106,0,0,e97ab50fc4c38142521988df08136e16805c9230e755be764c5e069c0c489
CVE-2023-34107,0,0,ea3015f1d7663ba7950e07defefd89d4097dcec5edfce1132a1e77d44640baa8,2024-11-21T08:06:33.697000
CVE-2023-34108,0,0,3402e0701d2c160f2d4947c662e8e780be4c0e3d4786367ea7bc334254eddffd,2024-11-21T08:06:33.837000
CVE-2023-34109,0,0,8b2cb117813e31c52ccd6f3832354ad65c925ebabe85a5db52c0d8c3b906d2a7,2024-11-21T08:06:34.013000
CVE-2023-3411,0,1,f97a4749568e98aab1e9cd14bc7b98af51885d8c795b6f94060a06b46312b691,2025-01-13T18:27:44.140000
CVE-2023-3411,0,0,f97a4749568e98aab1e9cd14bc7b98af51885d8c795b6f94060a06b46312b691,2025-01-13T18:27:44.140000
CVE-2023-34110,0,0,63d65df0ba884a1d3d10e2dbb4dec36e374eda14f431bc999df09b736226c75b,2024-11-21T08:06:34.153000
CVE-2023-34111,0,0,2a3997a129f578f5478c2ef53a74e3ee4f9834c1cc8fbb2b974925cb6d221dea,2024-11-21T08:06:34.313000
CVE-2023-34112,0,0,712d77ba93bf90e9e12cec06add8f3da8ce672d2779b0cbb61b7db822c8a6295,2024-11-21T08:06:34.450000
@ -226551,7 +226551,7 @@ CVE-2023-34116,0,0,eceb5c33a38e02aafa7ffeb47997e090e8ba9fa11e315d409c8eda2ed40a9
CVE-2023-34117,0,0,ca1d05f74d929b655fed396e704d07564375fed7fd05eea2a9bd4e6333b0b01e,2024-11-21T08:06:35.010000
CVE-2023-34118,0,0,766e948b08c7864f7a4a9e712508c91fbd3aae7701080ac7f54d8c0aa81725ee,2024-11-21T08:06:35.147000
CVE-2023-34119,0,0,4fc745241c14fce607b42c04ccfda529b13d7e3888073e648ed96f82e9cfb741,2024-11-21T08:06:35.280000
CVE-2023-3412,0,1,99a5e411f52d938c2f75f649280e4dcaabc33a0704ee7f7bc87187382aad3e16,2025-01-13T18:27:44.140000
CVE-2023-3412,0,0,99a5e411f52d938c2f75f649280e4dcaabc33a0704ee7f7bc87187382aad3e16,2025-01-13T18:27:44.140000
CVE-2023-34120,0,0,f656e181bafc2d2961a70ea48fa9c78c0a620ac9ae0a0b3a92a91f375470ad54,2024-11-21T08:06:35.410000
CVE-2023-34121,0,0,972d452d763b0b0879cf757c8d51bedcde4020e9bf8488b9a820e18c09e38e7a,2024-11-21T08:06:35.540000
CVE-2023-34122,0,0,f585e4332bb8bfbbab2b3607d749ecaf3551ff5d2da712c1ba0736863bada1bc,2024-09-04T19:15:29.087000
@ -226586,7 +226586,7 @@ CVE-2023-34148,0,0,2af8938fefc5e88a696a461cb59e68778c5c3207426d9cb46845aaf384070
CVE-2023-34149,0,0,de98b959d243fc958ea3c56d1c607b497cb887fb462ad341d81b0f69ae39661c,2024-11-21T08:06:39.263000
CVE-2023-34150,0,0,1823fbda35cf4f751cc671a99bacd7ba68664b9a7b88392119b56d4cb5ce916b,2024-11-21T08:06:39.420000
CVE-2023-34151,0,0,99655761750ec80cccabb2190e2dff1e94a4afa7357d176a172dac871102bb71,2024-12-02T14:34:36.813000
CVE-2023-34152,0,0,334da3b68a0c4bcbcd97713b755f74eb3f582cefd06ffbd3f5072dbe60ebbbcf,2024-12-02T14:34:31.887000
CVE-2023-34152,0,1,f5093699db674fd6792c311822d72917575e1f2b336ac257cc5faaab1f0e3a25,2025-01-13T19:15:10.400000
CVE-2023-34153,0,0,f13ce0a27b49659263b450601bbd71fe5847ef9a3d85533f16d9fc9563eae877,2025-01-10T21:15:12.310000
CVE-2023-34154,0,0,eafc3fe079370e37ff7df7a88839f07e4ee2c129fb8876ca3732c82414e7476a,2024-11-21T08:06:39.950000
CVE-2023-34155,0,0,18a874ed9abba05c434db529ec7798f406b89d3d8e8e89da1e2b9234231fa020,2024-11-21T08:06:40.070000
@ -239983,10 +239983,10 @@ CVE-2023-52476,0,0,89c828189d91fd1242960120a533d7e398dfcbfd293ab99f643c622869d76
CVE-2023-52477,0,0,eb5822d237396c41c04f52728d9bf515c950801aef4f539b7f08b45f3cf87079,2024-12-09T18:39:35.613000
CVE-2023-52478,0,0,9e05b88e7feb0641b6ca4e17d4a850f7ec536a2d854a57f1537b6f6a4af9b80f,2025-01-10T18:27:26.213000
CVE-2023-52479,0,0,e0ff4a7b0324404fe79eee53801e5fe13d6f1e2e9c91c97e5dab8f615a1780c2,2024-11-21T08:39:51.897000
CVE-2023-52480,0,1,d2e7b47e19154d214380376bad33b378aaf81d0a77e7753c5aa4424a4aa22f37,2025-01-13T17:05:39.887000
CVE-2023-52480,0,0,d2e7b47e19154d214380376bad33b378aaf81d0a77e7753c5aa4424a4aa22f37,2025-01-13T17:05:39.887000
CVE-2023-52481,0,0,c036169f36373e26e323dd8da99dbd8c63f236021e8c8a4a9bb39e20912dc147,2024-11-21T08:39:52.207000
CVE-2023-52482,0,1,0550d5295ece82b13a420ca7a1fc263c818f23bd27e72e085a819f217f4c7cc8,2025-01-13T18:27:10.853000
CVE-2023-52483,0,1,ab0109ac100464d057315dfb0c304712e2e9816b3ac72ec181570b14f6298ec8,2025-01-13T17:53:05.157000
CVE-2023-52482,0,0,0550d5295ece82b13a420ca7a1fc263c818f23bd27e72e085a819f217f4c7cc8,2025-01-13T18:27:10.853000
CVE-2023-52483,0,0,ab0109ac100464d057315dfb0c304712e2e9816b3ac72ec181570b14f6298ec8,2025-01-13T17:53:05.157000
CVE-2023-52484,0,0,688b7461214e279f98589a82904a607b59c917943fab1d733720294c9192c231,2024-12-10T19:49:58.407000
CVE-2023-52485,0,0,c2b5d4c1676355db8fd79448f87f50421c07ae088ffc2e3215882f350721667a,2025-01-09T20:20:59.593000
CVE-2023-52486,0,0,b08f0dc3ea33f52f41a2f2486e0789d6ae50523a2cf24b902634bff5a67956e9,2024-11-21T08:39:52.863000
@ -240003,16 +240003,16 @@ CVE-2023-52495,0,0,3848dd6249fb3b0098eceb1e102e5369e6a41e490097d267a2d230f8e731f
CVE-2023-52496,0,0,1ceff2e059153d5a5937cc8a150530bebb0b9a38b1ee039de0fbd3b5f63c655e,2024-03-08T11:15:06.913000
CVE-2023-52497,0,0,94fd6b58b926a91cb8098bc30bfcace92de1e085d39a09a073793b0edb7aec8e,2025-01-09T20:20:02.167000
CVE-2023-52498,0,0,065e116d7373a70de6fabe612c4006ae940715deb24209d18d3d1d28ec7bcbda,2024-12-12T17:32:20.050000
CVE-2023-52499,0,1,37302bb89cfa30e93b1cbecbac108e111f08e5db6682f392802812a67b5db06d,2025-01-13T18:29:52.097000
CVE-2023-52499,0,0,37302bb89cfa30e93b1cbecbac108e111f08e5db6682f392802812a67b5db06d,2025-01-13T18:29:52.097000
CVE-2023-5250,0,0,58ce2b34b475373736e77e988be92b15eb836a64d3c5382c9b7f18d2986aa016,2024-11-21T08:41:22.493000
CVE-2023-52500,0,1,bfa61ecc37f81aec9cea0362e8a01c95da4affd97672f73da2dd4a310756b928,2025-01-13T18:43:18.007000
CVE-2023-52501,0,1,e0a9d69f6462e74071a2ee33115da2d2a25ac8029b39452bc23babb2dd351b70,2025-01-13T18:45:17.817000
CVE-2023-52500,0,0,bfa61ecc37f81aec9cea0362e8a01c95da4affd97672f73da2dd4a310756b928,2025-01-13T18:43:18.007000
CVE-2023-52501,0,0,e0a9d69f6462e74071a2ee33115da2d2a25ac8029b39452bc23babb2dd351b70,2025-01-13T18:45:17.817000
CVE-2023-52502,0,0,53b5c7371b4f4373fe848296392853f59d8735375e39195cf54701f13f36c71d,2024-11-21T08:39:54.847000
CVE-2023-52503,0,0,b25829a16f78c14d9235d80b7c332263af083b055661f6466ab49e61a0d35aa6,2024-12-10T21:26:43.377000
CVE-2023-52504,0,0,7b00d7367755902413f54a344d1c934ccd6c5f85e27cba6919cdc853f813017e,2024-12-11T15:05:44.313000
CVE-2023-52505,0,1,41225aebe6c99f11f4fc4af881fa01b741adf7af69b8905e2862962825201af8,2025-01-13T18:48:17.593000
CVE-2023-52506,0,1,f85842570a369879a03ab0fd81cffecf740a1deb73712d38b86b3a61185a48bb,2025-01-13T18:49:25.347000
CVE-2023-52507,0,1,b6b39e1c9de54738cb02270773d5e967ee7dccc41c95e729148ec224d9d00f79,2025-01-13T18:51:41.030000
CVE-2023-52505,0,0,41225aebe6c99f11f4fc4af881fa01b741adf7af69b8905e2862962825201af8,2025-01-13T18:48:17.593000
CVE-2023-52506,0,0,f85842570a369879a03ab0fd81cffecf740a1deb73712d38b86b3a61185a48bb,2025-01-13T18:49:25.347000
CVE-2023-52507,0,0,b6b39e1c9de54738cb02270773d5e967ee7dccc41c95e729148ec224d9d00f79,2025-01-13T18:51:41.030000
CVE-2023-52508,0,0,f8139e600d46dca8f67ecb0a95236952f26c02714cd95adfe0dbbeed166d1ee0,2024-11-21T08:39:55.633000
CVE-2023-52509,0,0,4c32e1e52d82db6d2e5e667f80062d77bc1fa6b92446d15ee14c1f6c6f544cf4,2024-12-11T15:07:32.760000
CVE-2023-5251,0,0,8e5d86dd8015f5ba5db53e53cb223d5ce43b5c6420566475d898b38e0a2f8a7f,2024-11-21T08:41:22.610000
@ -240023,18 +240023,18 @@ CVE-2023-52513,0,0,97d7c95c4e6616756fc77008da3a9e34784f63a990f4286e2a59685516251
CVE-2023-52514,0,0,96b3bc37b65a7f0f11caed4828897554155b5e08fde97001434005eb59164e32,2024-03-11T16:15:07.720000
CVE-2023-52515,0,0,783d33279e8711f2f53faff3aa4d2bf5a8bc423e48cee26bb25bf599790fc992,2024-12-11T16:41:11.770000
CVE-2023-52516,0,0,c9433424f464a3aefd00d0bda0d407932aea710f1ccd0eb4aed297e697fdac49,2024-12-11T16:34:41.590000
CVE-2023-52517,0,1,f03e53ea30861610b7c6d848f8adc35648589c7c60cd00ff7feae31935882978,2025-01-13T18:54:30.323000
CVE-2023-52517,0,0,f03e53ea30861610b7c6d848f8adc35648589c7c60cd00ff7feae31935882978,2025-01-13T18:54:30.323000
CVE-2023-52518,0,0,6033333179ee7065b3ad5a7a294863593028e3c2a534a4a4a5dc1a8ac412775f,2024-11-21T08:39:57.030000
CVE-2023-52519,0,1,94b7dd9d7bb75a81a63dfbf0888e41d9d06a6f22cdc8c6aaaf3b5c7557f376cc,2025-01-13T18:57:26.213000
CVE-2023-52519,0,0,94b7dd9d7bb75a81a63dfbf0888e41d9d06a6f22cdc8c6aaaf3b5c7557f376cc,2025-01-13T18:57:26.213000
CVE-2023-5252,0,0,6e866dd390859261cd7659e88d39d09ee87f05ef749374a16d7e16e4e49555fa,2024-11-21T08:41:22.723000
CVE-2023-52520,0,0,d31cd448073f5b764992496529f1ce58fbaec56d048ef04f1b1f5151bc9d73f5,2024-12-11T15:16:55.293000
CVE-2023-52521,0,0,26ba094f0a43e00b237fc666ea879d557b221b56ad6aeee17c07d7717bd0e4ca,2024-03-05T23:15:07.310000
CVE-2023-52522,0,0,c13b0a3176143b06d3ccc87f08706f9245c7cdd589d25b2c0e11f3ccc3613bfc,2024-11-21T08:39:57.493000
CVE-2023-52523,0,0,c0acfce46ac1517ca8bcbb85593e9ad745512aec00b4863bc2b8f4a234a67929,2024-11-21T08:39:57.693000
CVE-2023-52524,0,0,3d2a70525cfd480ea47dfbe29cc70243d8b545b6dc30a10d5f6fefc987f46638,2024-11-21T08:39:57.813000
CVE-2023-52525,0,0,de1c6592edf5374eff5a62a845c9c1ae5d5d38f99effd2a5bc3d3de2256d9afc,2024-11-21T08:39:57.940000
CVE-2023-52523,0,1,5b8d7d4b352190dfcaca3dfb71df8e86a97c3b5825bdaf56118df9aae20c8466,2025-01-13T19:57:06.317000
CVE-2023-52524,0,1,a8bdabe41d4b9e145a11e25099c9bf5d837317aba03d38d35c8ca28cefa43f88,2025-01-13T20:00:51.600000
CVE-2023-52525,0,1,094105902ea19f75f46a0542857de43bf80f42671731aa6ff2be030a7bf1a62b,2025-01-13T20:04:04.813000
CVE-2023-52526,0,0,1438e98d7ebd761d3e4a2b5db47e2999a34f9aed48e4e48ea616537355cbf9b2,2024-12-11T15:19:11.407000
CVE-2023-52527,0,0,05cf521640d10effa17532f68f36199f87dafd68096c0227670d995e7b60321b,2024-11-21T08:39:58.170000
CVE-2023-52527,0,1,b6739ba44654e430422e37912f70a9580fd9f479243f1d69136043790d0f2ac0,2025-01-13T20:39:56.607000
CVE-2023-52528,0,0,f8dc1059cdecae7671bbeebfd74b733cc48cc6554467ed082aa97679e394d701,2024-12-11T16:27:49.277000
CVE-2023-52529,0,0,841566603cc3e72b05afcb01b587c6dcd4414a7fe1bc2081929dad3add9a68bb,2024-11-21T08:39:58.437000
CVE-2023-5253,0,0,7ead7effcc406218ae6035d8fe47bb748de44284fb99412a6bbf2042e8def61a,2024-11-21T08:41:22.837000
@ -240243,7 +240243,7 @@ CVE-2023-52714,0,0,de14f64658c68077a848c9d7169099f947c3064891aa288f876f46274f59a
CVE-2023-52715,0,0,40c133c7a650afa62e84d50889abdc2f10bf115a6958fb8619bb9f86fb85544c,2024-12-09T18:05:04.807000
CVE-2023-52716,0,0,e23e556efb2052738135a12d9d714c106a93095e20c11938c358672475db109d,2024-11-21T08:40:25.613000
CVE-2023-52717,0,0,6546ea96ba32ae2b161f65f20c7f1ad531534dcf0b1b8581277b1a6dce31a926,2024-11-21T08:40:25.807000
CVE-2023-52718,0,0,5d82c4df3e9f6e4ba7fdee40f888db394f7e1d51ac8e44e1a017f9f690669dd7,2024-12-28T08:15:04.797000
CVE-2023-52718,0,1,160282e24024fb1262e81494757a60f6cabaa9d290ef3102d5896f468341a4f3,2025-01-13T20:50:13.847000
CVE-2023-52719,0,0,e3f86bf719503ae7b09fa3135a17cf10d9dc9b4adbfb57625c3db8b69a7f3a10,2024-12-09T17:56:26.397000
CVE-2023-5272,0,0,4ba2e946788cd695e8caf8b6a2d9a57724a762493fbc909b19d2515ec3b7cb55,2024-12-23T15:18:44.853000
CVE-2023-52720,0,0,1fa5ff90dc57ff4a909c38527eebbb867f48496aaf35189850d5ac665cce26ee,2024-12-09T17:50:44.797000
@ -240480,9 +240480,9 @@ CVE-2023-52949,0,0,2dc054c34618db3270acf55c911e73637f6c82cdce362693cea11e6d1c410
CVE-2023-5295,0,0,2b5ab72da232f5f5a3ac2b39e98a9c8864bc1570b0eb638a3035ee2c7b09129a,2024-11-21T08:41:28.337000
CVE-2023-52950,0,0,8a52d8bd2da07af53f402b62fdad2a9f6414f85db952ad75359b2aa5d8923041,2024-10-02T15:26:33.837000
CVE-2023-52952,0,0,566ca32b1444148f195c331ac2a9ad38ecb816c7a11faec5b059440b5ddf4458,2024-10-10T12:56:30.817000
CVE-2023-52953,0,0,937694c1ff4588049245c509a1095e9a72124fa1eb3c2f97166ac1fdda1ba685,2025-01-08T03:15:07.990000
CVE-2023-52954,0,0,d34aec7b077777c950d019a051d3e933e9929b2b41862f5ef32ad6a30dc31360,2025-01-08T03:15:08.130000
CVE-2023-52955,0,0,9f60510c8787852e6adfc8ce1befdf406f59d657016071f6a12e787eab28ef05,2025-01-08T03:15:08.263000
CVE-2023-52953,0,1,505d22422517c509093e20be4fa6cef03d81124377bff73b0554278d7ae4ffe3,2025-01-13T19:08:57.217000
CVE-2023-52954,0,1,8b4c2bb5bacf8eb27f78e90b0f6b79604ad46840b6b95dc0e1c12132d9665f10,2025-01-13T19:09:19.737000
CVE-2023-52955,0,1,13e36a7d0105631ad28d1b673d8b8d79157696f3624304a40ce36ea78894df3c,2025-01-13T19:09:36.110000
CVE-2023-5296,0,0,b04d4fbd343c2e856b8ac0aee32ec4da2662cf244be6db174bfbc8064e9c4681,2024-11-21T08:41:28.453000
CVE-2023-5297,0,0,de1f61d8e4cdd3b9b3c94e1a593ca1d09a649ba1f11645b247141deb55a46d5b,2024-11-21T08:41:28.590000
CVE-2023-5298,0,0,f53cf1dcb6f115d92d16e5c66372cdfa06b4033bbcfb51673e0e9ae138cbc0c7,2024-11-21T08:41:28.727000
@ -242266,7 +242266,7 @@ CVE-2023-7261,0,0,ddac2b275fa7ea517c7dade7545137efdda503fdf2e011abe40181729ccc83
CVE-2023-7263,0,0,cf7920ff5b3068b39e94a13bb6f77d504242e61e7c2b3ec28afdd1a44dce1a82,2024-12-28T07:15:19.580000
CVE-2023-7264,0,0,481a3123c728ee9b31d977e1754c02d6eb9c9d972c045f9b799c0c77e37a60b9,2024-11-21T08:45:37.997000
CVE-2023-7265,0,0,c24118f188412f71957951e5a194c8feaa5aa2870f8d4bad1cae66392f13b12f,2024-09-06T16:38:04.533000
CVE-2023-7266,0,0,06715857462d7c9870426208c4c44ce95d4afa6874f0a94bc75a0e92e1a6309a,2024-12-28T07:15:19.967000
CVE-2023-7266,0,1,747c05f24a13b4f02e6fa3179fa6e81dbafd40c7bda44e4a6d968ba0d7b0112a,2025-01-13T20:48:22.750000
CVE-2023-7268,0,0,a007920b048244bad12b3daf0ade65763569e4511640cd0844ab63fc1ad6a18e,2024-11-21T08:45:38.200000
CVE-2023-7269,0,0,808547aae37c3720945cb2e9fb822611d037a6a9f4f70083a54994b35322f068,2024-11-21T08:45:38.383000
CVE-2023-7270,0,0,2cf4371b77ac591f985f4aa4054d5c68cfc25f0a8d757e8da8652827f079b721,2024-11-21T08:45:38.553000
@ -245057,7 +245057,7 @@ CVE-2024-12208,0,0,853007bc09d49f6c092cb33c65061bfc51c7e3b97e6ede52f3abfcbb92136
CVE-2024-12209,0,0,965d45920161ad8379a478313464ecb572a2b8b8ed1bf056a1646168e0b8105f,2024-12-08T06:15:04.823000
CVE-2024-1221,0,0,c833d2d1840e5e81b3c325295532e3c4cac8ba514abb434d638a7c419bdc43e8,2024-11-21T08:50:04.920000
CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000
CVE-2024-12211,1,1,4df7fb84efc9fc12f44c758bef0f4a52c867cba7b75d71e208fe1d5fd8aa95de,2025-01-13T18:15:15.157000
CVE-2024-12211,0,0,4df7fb84efc9fc12f44c758bef0f4a52c867cba7b75d71e208fe1d5fd8aa95de,2025-01-13T18:15:15.157000
CVE-2024-12212,0,0,4068a90166bc858f8bfa4c7fe1dbc180f7e4e033930f31a1b74471c9abd7763b,2024-12-13T01:15:05.810000
CVE-2024-12214,0,0,145b7db175966477886a9ffd7c811efe626794ad8e1d70413662bfa5c01eb691,2025-01-07T05:15:16.470000
CVE-2024-12218,0,0,c54e0970e9fa3f5da91494a744c33c1884c0ee1f4d82830e251b56e753e1af4a,2025-01-09T11:15:12.280000
@ -245335,7 +245335,7 @@ CVE-2024-12582,0,0,bbfe1aae814f308a85392c13709691d46da248e6458c80cb519b63fa483aa
CVE-2024-12583,0,0,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a08fa,2025-01-04T09:15:06.090000
CVE-2024-12584,0,0,adcd511bb3f4eac61fabd0c77513e0f49514ba8fec705794080ba1b5bd973bc5,2025-01-08T07:15:26.833000
CVE-2024-12585,0,0,5da3be9bc678e425dc481c70b7523d18c5d89e9715457ba9168db2468bb42cc7,2025-01-08T16:15:34.130000
CVE-2024-12587,0,0,fa0892d68b7bb4f6804fea8fc811eca021bdbb7440a414a14dfb72694409d2c4,2025-01-11T06:15:25.070000
CVE-2024-12587,0,1,2c2bb6109f838cede19935d42d3fb45b90001a4bd2b3fd87b8ac1f4583f8e25b,2025-01-13T20:15:27.283000
CVE-2024-12588,0,0,9ef4dd85f085f6ba612688cc14a2c49d05248e20e75bd2d7bdd4aff39b5ac0f2,2024-12-21T09:15:06.233000
CVE-2024-1259,0,0,1c6bb100fc9cba505c4d696801bfd3102c508e530bb2e36c86a6685675278bd7,2024-11-21T08:50:10.730000
CVE-2024-12590,0,0,217ef4dab25f45d20c71439c17fd49c4f82558ccd785c0d0a569568075f7d918,2025-01-07T04:15:09.607000
@ -246730,7 +246730,7 @@ CVE-2024-20338,0,0,ca4843067c4da30bbb3f01525a545fb9de11e060dcc215ecc535aad62ff8f
CVE-2024-20339,0,0,94ac06b012520dee95a6ca36fdab6f6b7d2db7e2b8d6560499db3979f111ac8f,2024-10-25T12:56:36.827000
CVE-2024-20340,0,0,b2dbe38c45a22964e4a8be4a5c662f6c83eef54f6dd511860a120842bbafcd85,2024-11-01T17:40:30.980000
CVE-2024-20341,0,0,1cbedc76667b6941a6fb9da7635e5f7b766cf4de7b6265c72e00ce648d8cca2e,2024-11-01T17:22:26.577000
CVE-2024-20342,0,1,db1d0c21b72dd8c64ae0e3a4a8cf6d0e199d8f767aface3296a1c63ea389af1c,2025-01-13T18:15:17.057000
CVE-2024-20342,0,0,db1d0c21b72dd8c64ae0e3a4a8cf6d0e199d8f767aface3296a1c63ea389af1c,2025-01-13T18:15:17.057000
CVE-2024-20343,0,0,9009169a3fc35272ca85d4387127dc13ddbde156dae8091d383bb29318a93684,2024-10-07T17:42:40.777000
CVE-2024-20344,0,0,afdf0b6fd6474a87390aca4a2c4b23109b5f07756453a6d0aa3a40e4b8058114,2024-11-21T08:52:25.117000
CVE-2024-20345,0,0,c290f9e3041f6c749f5dac4109f1eede5e1b312ce5a83808ae887ee951a69f81,2024-11-21T08:52:25.243000
@ -251590,7 +251590,7 @@ CVE-2024-26705,0,0,a308adda031f2eda9cd983e43cb1e8f1e80f61b260a2234635f0d97047565
CVE-2024-26706,0,0,b6e079a708d094b83bb5d7417439ddccf1c4f1876e5690709f65a274752091a0,2024-11-21T09:02:53.200000
CVE-2024-26707,0,0,1806350bbacbb6f76de5db409398dc8a7b1e6f15c7084d9e746c55e2adf05efe,2024-11-21T09:02:53.313000
CVE-2024-26708,0,0,47ec8499304cab94bfbfa9b8a22b56db0f85ef56b77fce5b97de36f3113336c9,2024-11-21T09:02:53.433000
CVE-2024-26709,0,0,3ddbe105f0576d9f5dea19ac3bdf45f2d1c89955111fcfed85a85208732fc2c4,2024-11-21T09:02:53.617000
CVE-2024-26709,0,1,84265dc256d943df4540d48ae1b11a8d0310b66ecceaef365d267322aba660bc,2025-01-13T20:03:28.797000
CVE-2024-2671,0,0,7868b0c3d3bca338bc309b82ca1d0b8bd8df4ecbefb4e6a6f37eff750b8ed14c,2024-11-21T09:10:15.420000
CVE-2024-26710,0,0,6ac3ed3e058c9245f76455df758aa5822954706d5927ffde47193e09cb8d8b8c,2024-11-21T09:02:53.723000
CVE-2024-26711,0,0,8dccb84b3c19a8be9b5c23386e56431114b107c936ab5d88e825fada25c33413,2024-11-21T09:02:53.837000
@ -265139,6 +265139,7 @@ CVE-2024-44761,0,0,f2fbd374c905a05d9df4fb95583dd2553e55188e5ecbb406bb2b5a2754599
CVE-2024-44762,0,0,0252031658b287d2b24f86957e87260de5c6c531326cfec0caf9dfdb500c9354,2024-10-18T12:53:04.627000
CVE-2024-44765,0,0,f81ef15b0a3a61859cb1b17066290c8490ac2adc22a484a3ce700c9973dfd276,2024-11-18T14:35:03.200000
CVE-2024-4477,0,0,f8c8347117fb6def6bdcd4ad9e5293fd63ac62e9258176671603ccdc713d0e8b,2024-11-21T09:42:54.207000
CVE-2024-44771,1,1,8cc087362def3995bf77f63defb876659e6b0a8af8b94e4a9c30df191cfc0315,2025-01-13T19:15:10.670000
CVE-2024-44775,0,0,011306915a1ccec8a2dc43a0525a6e4c4a138ea71cacacbb4139dc7838ff48fb,2024-10-16T19:35:10.167000
CVE-2024-44776,0,0,4a401f17cb489db8e3a27a309be25f5339458e753f79a473b6f579dab3a5a708,2024-09-03T18:33:26.287000
CVE-2024-44777,0,0,a398edec91d4490afe5ef74579daaf4dd8cf95eb1a91d4125ac3c877af1c7458,2024-09-03T18:33:38.413000
@ -266084,6 +266085,7 @@ CVE-2024-46300,0,0,6a8d7c1dfb1358af3b6a2d888860f4bd0f51cc893ec305be3d651f975d853
CVE-2024-46304,0,0,f2308ace0e3855c77f0ea6a953a03c48300c28ef52897aa953b7959e459b6f35,2024-10-10T14:15:05.100000
CVE-2024-46307,0,0,354fa930eea3d99eb7fe8341a2ba5a2dbb298d263210ab23b2888816fdb23a54,2024-10-15T14:57:38.387000
CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000
CVE-2024-46310,1,1,9f2b60253fdc77908806ed65a460ab498a78bf46117a4b71b62f2f6ce487b70e,2025-01-13T19:15:10.803000
CVE-2024-46313,0,0,a4475f21065819107b679f002f45aecb4f6fe3381612a107a4943beedb28de95,2024-10-04T13:51:25.567000
CVE-2024-46316,0,0,f153a1de1b2d63eaa55f7a87805baef45f2c081f83905d6b1651684c54b5dc31,2024-10-10T12:51:56.987000
CVE-2024-4632,0,0,88178c627a2a2444e9a5481c086756a7133c95edfb672bbe2e48b806cabf429a,2024-11-21T09:43:15.227000
@ -266147,8 +266149,10 @@ CVE-2024-46471,0,0,589331dcf0f8c9c450c6e7b62ea573b2d697ed156abdf0841e50912165e0a
CVE-2024-46472,0,0,2bfdd82019e257a999a07f7e7f1ca5ea2cecc586102f438773f3e9b8b73a6851,2024-09-30T12:45:57.823000
CVE-2024-46475,0,0,8de337bf21f8e76ccf4e6b762e2c811bd622fb2d069c67372f969f963e9a513d,2024-10-04T13:51:25.567000
CVE-2024-46478,0,0,f70f3b5c1ce34e91e4141e4b2cfc565865d5d214d85b67dd8586cdb93782907f,2024-10-25T20:35:09.710000
CVE-2024-46479,1,1,3e0e7af9c97d4ca976ec229743d4a5a327100ebfaf5e59eb638d2dae254cdfc5,2025-01-13T18:15:18.003000
CVE-2024-46479,0,0,3e0e7af9c97d4ca976ec229743d4a5a327100ebfaf5e59eb638d2dae254cdfc5,2025-01-13T18:15:18.003000
CVE-2024-4648,0,0,212eae539e1c4f9e76bd7794cb06c3cbae5f1a5abb7f9e09441f66d66e134975,2024-11-21T09:43:17.023000
CVE-2024-46480,1,1,bbd2098c1503933640229cb1fc42c014946e86ba7f2991b7ab4b40c6cffd07dc,2025-01-13T20:15:28.147000
CVE-2024-46481,1,1,e7e962cef586598466dafbc13f2afbf5ddee2b19c37adec9bfb2f658c837531d,2025-01-13T20:15:28.300000
CVE-2024-46482,0,0,e4c801a2cf34271c78e5d32f990a4d755bf1dcc521ae213f4144174e1d100bef,2024-10-23T18:35:03.670000
CVE-2024-46483,0,0,5f5b506edb7d89b259e9e397ae75c01096f4b3cb3d63773184b27131fe14eeb5,2024-10-23T19:35:11.493000
CVE-2024-46485,0,0,c5c003208e4a28b0ec5c2baa1571cb1aa48ca8b81c90c708a253ed626fdcfd98,2024-09-26T13:32:02.803000
@ -266504,9 +266508,10 @@ CVE-2024-46909,0,0,23c76f6e1a6ff88eaca1f23c162ae0295380b6a8eaa129068dfbfc189f6b8
CVE-2024-46911,0,0,3d0ee5b10efd83bd968feb73195ce7d2aa3abe80ac847507929e8b55f2484d57,2024-11-21T09:39:07.520000
CVE-2024-46914,0,0,8183f2e81bda981099173d1b49f2e9d3c952a93e63b81e2bd23ce00d12f134f9,2024-10-22T22:15:05.810000
CVE-2024-46918,0,0,4ffbb01b562296291ac13b104d12d655761406982e7cf7d77cad5d9f13d483f1,2024-09-20T18:14:23.897000
CVE-2024-46919,1,1,111dd7ab38d7b6179b0f989d061819f9bc8dfbb65f85cadc2eb417c674cf8cdb,2025-01-13T17:15:16.833000
CVE-2024-46919,0,1,1b8f5f4c834e44498c5898c7cba6f4b1a56cdab4d29b49d3eeaa641ef13fac17,2025-01-13T20:15:28.450000
CVE-2024-4692,0,0,23393761d23a527f075ec0ab23d8db8e227006f309d26221ac72121be686a8a6,2024-10-21T16:10:14.873000
CVE-2024-46920,1,1,04d155604f31acbaf8f66ed25b9906cbc8a1c5e977b7da56ea0beb00e9d62be5,2025-01-13T18:15:18.517000
CVE-2024-46920,0,1,e4ac6b82e18dfeb2051ce3b7e2456127293ea60f027be0301b5c27e57f1906dd,2025-01-13T20:15:28.613000
CVE-2024-46921,1,1,bc35bbe8caeb79c9a411f9da2cff91716f1bcdb6338c53291389b1c703ef875f,2025-01-13T19:15:10.903000
CVE-2024-4693,0,0,a9c8482c3ea2d347585fc5de3f7febf7c02e48c514bcd2a505cc67d911f0408a,2024-11-21T09:43:23.560000
CVE-2024-46934,0,0,a6247ccfc7686585f1ad4c13508e51c74923607d7000191b941f9a6c77eca291,2024-09-26T17:41:09.580000
CVE-2024-46935,0,0,5cad8a9a95361aabd63f1624134999baecb2a4cd5a3fdbbc89b1eb92fa778d51,2024-09-26T17:39:33.123000
@ -267349,9 +267354,9 @@ CVE-2024-47888,0,0,f29473c64160f0d588a7ca069a65eb155d847c3556eac13a0a5e08def2ade
CVE-2024-47889,0,0,fbc19ced86c6fe97c19cf36af507f82d2f6cb4f350a639ca6656c9db442c9b66,2024-10-18T12:53:04.627000
CVE-2024-4789,0,0,cb1fce1149cb253592c06cf88232fe30f43f7e24305ca3501b7b2ce5d58908d4,2024-11-21T09:43:36.877000
CVE-2024-47892,0,0,e300db381f4cf7705266e90cba53b1a4b7a7defd036013afcd4a8d8ee5ca06f1,2024-12-16T19:15:08.393000
CVE-2024-47894,0,1,10cb3fcf43aee84728015caa1ec7ea40b57870fe842fc76e102626be48558b17,2025-01-13T18:15:18.693000
CVE-2024-47895,0,1,24265746246461ce822ef4f2b8b2e78f2dae4b75e456193756e8e977fda8851a,2025-01-13T18:15:18.933000
CVE-2024-47897,0,1,4f2e88ecc7c8c00d74363df7285f2e3e9f4702003cb3d2b7f2f87967d3a42b58,2025-01-13T18:15:19.310000
CVE-2024-47894,0,0,10cb3fcf43aee84728015caa1ec7ea40b57870fe842fc76e102626be48558b17,2025-01-13T18:15:18.693000
CVE-2024-47895,0,0,24265746246461ce822ef4f2b8b2e78f2dae4b75e456193756e8e977fda8851a,2025-01-13T18:15:18.933000
CVE-2024-47897,0,0,4f2e88ecc7c8c00d74363df7285f2e3e9f4702003cb3d2b7f2f87967d3a42b58,2025-01-13T18:15:19.310000
CVE-2024-4790,0,0,b9d76a36166d9f8d4bd7b87bb2c3b8f2d1cb59ae69b213b42a13db79aa975016,2024-11-21T09:43:36.990000
CVE-2024-47901,0,0,3165d7a5ba37411c22ef300e066496e43f11ee0c48270295fa8bb2b50803f6e5,2024-10-30T15:39:47.430000
CVE-2024-47902,0,0,fdda8971bba9d387ffd8bac2920cf21627a1eb6b178788f8572a5ebbd51c29b6,2024-10-30T15:48:39.207000
@ -267800,7 +267805,7 @@ CVE-2024-48876,0,0,e956412c9e67ebab3643a6f85503effdcaec15b67887a62803f066802d153
CVE-2024-48878,0,0,61df8c716ea1a9423d8f98d007fe741d86381fb579c3442ef6d827deee3b213c,2024-11-05T19:44:58.650000
CVE-2024-4888,0,0,133d57bae18b01966145fd4e4ce13e18e7959193dbb6b4323cb9d35593035efb,2024-11-21T09:43:47.830000
CVE-2024-48881,0,0,ebc6f1728ddca45a5c4c77e921d1ab1f076b9c09394d13101391d66674a8d76b,2025-01-11T13:15:23.437000
CVE-2024-48883,1,1,9cb813a43fefbdcbc9c054fe52073c0bb352ce757d6e83add522337ce4d0f93f,2025-01-13T17:15:16.947000
CVE-2024-48883,0,1,40a7c06416987571c8a8b08bd952b0491dd531f3479f503fba90cb6ed5c81613,2025-01-13T20:15:28.770000
CVE-2024-48889,0,0,8e1bac12eb50f3243e5ec10f0474e909f75dc6516eb6b1b6cee870377808ea68,2024-12-18T15:15:11.713000
CVE-2024-4889,0,0,54e41cd985dde0162870a1a62b42a9fd40bf90446677bc64ce2d3dd7fe90e1b1,2024-11-21T09:43:47.970000
CVE-2024-48895,0,0,2619cbfc056db229022c601c361879a86e8ef7297a78db8864167658fcd89d44,2024-11-21T13:57:24.187000
@ -270649,7 +270654,7 @@ CVE-2024-52921,0,0,25b2bda62d23ac11ec224824331b7110da2b691d46f1f7381cfaabb403afc
CVE-2024-52922,0,0,6a8e09d1bf0adb255aa582ae6b8ef0e4e406447b917ba92ca194beb3eadfb929,2024-11-18T17:35:09.720000
CVE-2024-52926,0,0,5021ba3f217b734483a326034e850572aad7fe69e34251b753d7998240a26e61,2024-12-24T19:15:06.940000
CVE-2024-5293,0,0,f489071fddfba63fc047e3d21a5cfec46b34b73b22b63f08d456cdba6a84add5,2024-11-21T09:47:22.487000
CVE-2024-52935,0,0,0b8be60288be553867695875b4253488c0e2b8b8e85a7e60bb58035d7b58a187,2025-01-13T11:15:08.743000
CVE-2024-52935,0,1,82bee18e7666e3b9627a83dc0a3752879a976f8cdc2c5166681676e372856b87,2025-01-13T19:15:10.993000
CVE-2024-52936,0,0,a1439d337fa72544d7f992bae6abc1ed03039160e6f2b23e57535b986e6ab2f8,2025-01-13T11:15:08.883000
CVE-2024-52937,0,0,5f36e12fe977c800f711f4d25ac90366c60f8b326fa32c674c6a617d8d4a2dc9,2025-01-13T16:15:18.093000
CVE-2024-52938,0,0,5a308697e3bf9106f1daeb9736111ff575bb1eeadbdfeea87a5220423f329ff5,2025-01-13T15:15:09.300000
@ -270876,7 +270881,7 @@ CVE-2024-53200,0,0,382e2ed7c91ff816c9972e95788547d617ab94e25d45361504cd38a28e7c4
CVE-2024-53201,0,0,c711eb722b8f180d53de7616fe5e83ef81c9c735e27696929f70cbb31bb1797d,2025-01-08T21:26:58.670000
CVE-2024-53202,0,0,7d23e49d3acff80a64d7280021d5b5a203b4ae3822284474ef22a299df0b3198,2024-12-27T14:15:27.970000
CVE-2024-53203,0,0,5b84b307ac617b2733d67355e11a8602cacf08603e863af6ef90308e193fa443,2024-12-27T14:15:28.083000
CVE-2024-53204,0,0,a67dade237e65bb4a6674739087981fbee3f96204ef4395e1de0111b2e3875f1,2024-12-27T14:15:28.207000
CVE-2024-53204,0,1,253a86a67cc86d83f5b45b7081fcaef8f54aea697a0bb5732c9f1f31c626c086,2025-01-13T19:51:04.787000
CVE-2024-53205,0,0,310e80c96eec5b9caeb40d4ac42b3fdd15b85eabb0a1c3c5481d29db45eb8c48,2024-12-27T14:15:28.340000
CVE-2024-53206,0,0,d800df8f6d68aaab7abe7c1baba1443a71a7884f9dca1bdd8e5aa1f9928ba79d,2024-12-27T14:15:28.453000
CVE-2024-53207,0,0,eb965d61db6125837dce0de6ef3af14c44ea9331488a35d8508a0d1b2053b009,2025-01-08T21:26:42.470000
@ -271390,7 +271395,7 @@ CVE-2024-54117,0,0,cd3dd10e2689d8474911355b4c987c7aca3170647fbf603148daa14ddf57f
CVE-2024-54118,0,0,3d5435da91a32a7bf2206da2f7e289c3ed3a80b3e8f9d704d669dbbeea24a3de,2024-12-13T02:15:04.770000
CVE-2024-54119,0,0,203b5add8d1c8bb3b99dbd65acf3ec32defd37e324f29074464c74c5f5b42510,2024-12-12T13:15:11.350000
CVE-2024-5412,0,0,c89822b010e86cbcf24c047ef6717bc07af2215177f02665c5af47a090ff2c1c,2024-09-06T18:07:43.940000
CVE-2024-54120,0,0,86995795087749e9ea55c90e42358214d5d49c83a2730f1e5217425edfcff8b7,2025-01-08T03:15:08.707000
CVE-2024-54120,0,1,fc37b06b56d95ac60a56b11c7cac808590313ed84b6ecf221e2db0272ea1b080,2025-01-13T19:27:15.427000
CVE-2024-54121,0,0,e6931efeac60887dd7cab166567209b65e0059c8a120215e067e5ec970e9f26d,2025-01-08T04:15:07.120000
CVE-2024-54122,0,0,d40f0694d68115518c21d41b4eee81bc4359d1962c6853404f6547d3c1bd39a1,2024-12-12T13:15:11.527000
CVE-2024-54123,0,0,adb9d810678343393bca99901a3c1b47719ef78df3ca8f4e2f7e11c7b4e0333a,2024-11-29T19:15:10.287000
@ -271772,7 +271777,7 @@ CVE-2024-5468,0,0,83f1a353a5b95b83c36aafd7fb0e880d8454855ef6bbd816a181cff50dcb42
CVE-2024-54680,0,0,ad61972708bbee5067cb0b02bfec2bac37188f1bcb38ae431510ae7b381f3add,2025-01-11T13:15:27.340000
CVE-2024-54682,0,0,014e168d2df7708ff5f91a3c7e1142a04001293f3734328797e32d8f370d3481,2024-12-16T08:15:05.513000
CVE-2024-54683,0,0,df238e349e4378311580023a0609c980670d89d3758a7a6c6e3c8f96b5a489e6,2025-01-11T13:15:27.490000
CVE-2024-54687,0,0,4843463d24c47ae2aeb1e26301a5b9502ddc0257784ca9617fcdea7b0634c0f2,2025-01-10T18:15:22.630000
CVE-2024-54687,0,1,edfa64742c2d4dcf37d41c46572e277e022b38f127cbca49510f62103a2ed788,2025-01-13T20:15:28.927000
CVE-2024-5469,0,0,0593227e51e97383649ced684c68d7aaf013a250af5a8e55d437662843299556,2024-11-21T09:47:44.633000
CVE-2024-5470,0,0,b70339f8a022f56de8d4eb030bd8f5d3563ba0fc9c1634fd55ea697aee92ede9,2024-11-21T09:47:44.787000
CVE-2024-5471,0,0,631b7a50303d6f9a193814092037f29379ca6ca2282e0b67207306f8abcc9ba4,2024-11-21T09:47:44.903000
@ -271859,7 +271864,7 @@ CVE-2024-54994,0,0,dd824f3cf92f593fb6e4c555cbcac1a5d55f6158ceb4bb766cf564a90f298
CVE-2024-54996,0,0,5d8c07e61eede1603ccdca6f35250f10be0d6813b862e8afc620d73b51073af6,2025-01-13T16:15:18.270000
CVE-2024-54997,0,0,2cf75931623f004a29e91130f12a5a6a3b71132a62cfc94cad60bf173593b41c,2025-01-10T21:15:13.083000
CVE-2024-54998,0,0,8112136503090ac1585a28559857630948b5c08a1a758d7a78460b3db270e978,2025-01-10T21:15:13.203000
CVE-2024-54999,1,1,0eb16ddbc9ba2791273443a41400d8019c23c0739da45badc9fa587e3ec6eb9e,2025-01-13T17:15:17.057000
CVE-2024-54999,0,0,0eb16ddbc9ba2791273443a41400d8019c23c0739da45badc9fa587e3ec6eb9e,2025-01-13T17:15:17.057000
CVE-2024-5500,0,0,280f34db2c8783872a68d6daa217e3e1e4614074bb8e8b0a741315b28d98613a,2024-11-21T09:47:49.373000
CVE-2024-55008,0,0,46155f9f511c9f5f76f29eb42e0ab350c4f420855b69bdcc893ca8113faf6544,2025-01-08T20:15:28.467000
CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000
@ -272422,7 +272427,7 @@ CVE-2024-56433,0,0,41933bdf4cf50f4b61b9a39102f868e297a293e10ec834a2eac62b7879bed
CVE-2024-56434,0,0,c38d6bd7111b766e42099f8b17a58e6f95abad7b836f20f54664e2006a55f006,2025-01-08T02:15:25.330000
CVE-2024-56435,0,0,a6b9a986a1657a73fb9f5c59d2598535666faf53ac60b2c834fb1a24f728c95b,2025-01-08T02:15:25.487000
CVE-2024-56436,0,0,47afde40a091b787140b09341604b928e7f41b98d32166125274686ea00202e1,2025-01-08T02:15:25.603000
CVE-2024-56437,0,0,54ac281d7e990dcfe2ea842216694d1ac65a0135ef120dbbee077631df857172,2025-01-08T03:15:08.840000
CVE-2024-56437,0,1,c63a52ba38fc488737558848b9c8de8bd97794641864128b0efcbd82692e90d6,2025-01-13T19:27:34.937000
CVE-2024-56438,0,0,a8de726444760abf673229647a141e422b630f203ef45c36c35fc462f477e941,2025-01-08T03:15:08.970000
CVE-2024-56439,0,0,a234176053e19689b53ebcf04737cad7c2a140c3eb3e74de7e619fb842a50ffb,2025-01-08T03:15:09.113000
CVE-2024-5644,0,0,160a368b3a7f8d4e53712fad16fb1094662061822d6ba961b4f309a68658057a,2024-11-21T09:48:04.900000
@ -272655,7 +272660,7 @@ CVE-2024-56700,0,0,5f62e13bfa0eea45d94c6d5c9bec178b45e7ae92140fc843457a7394c816c
CVE-2024-56701,0,0,d79b5e847459e856711b89867e1c2d3c31f0fd02ba1f2893d458ee4445830b89,2024-12-28T10:15:17.620000
CVE-2024-56702,0,0,62ea9ba42e8116e4eaf3d1eb4998b0393a4e76bfd7df3cb54ed07a73ce6799ee,2024-12-28T10:15:17.980000
CVE-2024-56703,0,0,cab66ac2133d81e07560a183ef009a01fd1b4a1df36ac56a390e43408c12a633,2024-12-28T10:15:18.433000
CVE-2024-56704,0,0,48e5a0d619df270073488e7c19d7903171e1acc92eea5d1ff8f4c9b18c1aff57,2024-12-28T10:15:18.817000
CVE-2024-56704,0,1,fda84b9585d7fe2d80812e683f9a8bd3675dd599cdc9907d9a45b0ad4a180589,2025-01-13T19:55:28.720000
CVE-2024-56705,0,0,d44dcf1285cd38e1d062c7fb5bdaee01c818db7d4cf87dc2b219ad9bde922d33,2024-12-28T10:15:19.043000
CVE-2024-56706,0,0,a4ba04f2ce7d48f15b7673aaedbcd9366ea8d3ba1e2c788436c2ecc7452df2fb,2024-12-28T10:15:19.400000
CVE-2024-56707,0,0,b05b8792b2b7de0466fe1a56bcfb7d27eb2e048786ee1140fc3035d1622e8c70,2024-12-28T10:15:19.660000
@ -272825,12 +272830,12 @@ CVE-2024-5737,0,0,fb7afad0bdcad96b29de7c5519f73ad0e5af614975f3cc39b56e0ff717aa63
CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000
CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000
CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000
CVE-2024-5743,1,1,d0e55743955a19a87c824f43f113517e2001f346d7c0d7dc8f98ceb853b6977e,2025-01-13T18:15:19.517000
CVE-2024-5743,0,0,d0e55743955a19a87c824f43f113517e2001f346d7c0d7dc8f98ceb853b6977e,2025-01-13T18:15:19.517000
CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000
CVE-2024-5745,0,0,f5c2e0226ff1c47168df0c237981cdbe9e1838dc0b6144c20848884be5dc91bf,2024-11-21T09:48:16.423000
CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000
CVE-2024-57487,1,1,4a1cb9cd7d48ab7f0cad728c2d066adecd8a42e68531aaa45278aae1d638589c,2025-01-13T17:15:17.160000
CVE-2024-57488,1,1,0e9fab348abd23a9a407960ab24a4b35fb024cec622a31fca11e299849b55085,2025-01-13T17:15:17.263000
CVE-2024-57487,0,1,0807b290efd6cc8f6e7e6b31de66036ade21e0044433af00698c818fcbb278ba,2025-01-13T20:15:29.090000
CVE-2024-57488,0,1,d19c2052fbaefedd169eceeb76f3704e3b884097b8c5ff84fd1ae0a72fa1e299,2025-01-13T20:15:29.240000
CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000
CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000
CVE-2024-5751,0,0,a075ba1bce0283dcf2eb1909116e18ed1aeef6c0cfd6415ef5931a3fb6320c2f,2024-11-21T09:48:16.813000
@ -273070,7 +273075,7 @@ CVE-2024-5970,0,0,f3015a747bcbfc95b2c2fa4913554bd078558858579cc71fc5d895a9629d9a
CVE-2024-5971,0,0,f03f53869694442f097b92cf60ccdd932b1bd24804d85a21f37d5d1a93456535,2024-11-21T09:48:40.127000
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
CVE-2024-5973,0,0,5764fe7dba8a714456e598c82d1ba942598616db44809839e67ac1f6bf90f970,2024-11-21T09:48:40.297000
CVE-2024-5974,0,1,498de258bcf33c56ad60db0f86f98a3aed7e28109adf8bf05e7857a33b2cf79c,2025-01-13T18:15:19.697000
CVE-2024-5974,0,0,498de258bcf33c56ad60db0f86f98a3aed7e28109adf8bf05e7857a33b2cf79c,2025-01-13T18:15:19.697000
CVE-2024-5975,0,0,1540d9cf16be3cdaab49810d2c22343710e6ed2f67972005f1fcea70f1fac8ea,2024-11-21T09:48:40.623000
CVE-2024-5976,0,0,369569b6461b201198770f0e5df4f7361ae376d78e8d83ac196e5f314df7947e,2024-11-21T09:48:40.793000
CVE-2024-5977,0,0,909876bcbf4f2ad2839dc39ff9f402926337af028be37025b6a8c86d94af7f35,2024-11-21T09:48:40.960000
@ -273420,7 +273425,7 @@ CVE-2024-6347,0,0,ead9b349654f8c1b56b42b60b3e21504af84ff862f187d8c4f01052391405f
CVE-2024-6348,0,0,f8ec53a55d7061e6e616a9d49e72c1cd9f0282aa80090fa0b8e8fbc34eed5872,2024-08-20T16:17:03.810000
CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000
CVE-2024-6350,0,0,1fc124e07d9714607d8d4610b064f72d1361319398d6b6baa75420c813d318c6,2025-01-08T18:15:19.880000
CVE-2024-6352,1,1,4d147067ca72f1f24736c73c902fef540e6a6e218bee3f4c7ba7242d6936cc0c,2025-01-13T18:15:19.887000
CVE-2024-6352,0,0,4d147067ca72f1f24736c73c902fef540e6a6e218bee3f4c7ba7242d6936cc0c,2025-01-13T18:15:19.887000
CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000
CVE-2024-6354,0,0,b2dccb6ff0cf7d4d778c16d437a8f334569c687ad872e701936b9155052ef539,2024-11-21T09:49:28.670000
CVE-2024-6355,0,0,4c7974dc5e52fdaa43d5f5a202a9f019ba0b6401d733645ab7e0c57b90e3af56,2024-11-21T09:49:28.797000
@ -276594,12 +276599,12 @@ CVE-2025-0401,0,0,387e19a2812b1284381b4c9d44a677a221e0b3ef26759604ce2f59eba2070a
CVE-2025-0402,0,0,9535638fcb03e30ea11b5c4b5bbda52e7fa7f3950ffb295da164028bcd69947c,2025-01-13T00:15:07.707000
CVE-2025-0403,0,0,410c24d6d1526a0b93f1cc8d7a91ca28b7a89a1c34c372c6fcb34f8a0ae69847,2025-01-13T00:15:07.873000
CVE-2025-0404,0,0,9c1c31a342a5cece29ac87c84fe863c6f7ea1dc0117f323ba50b5e921bdd430b,2025-01-13T01:15:07.227000
CVE-2025-0405,0,0,fa7310491d9b035f03a92a039aa8a0993082233b0ddec8e7ad737235e8a8c98d,2025-01-13T01:15:07.430000
CVE-2025-0406,0,1,9d39f4351b80363b18f117ed5d9911db0718111194c53ca1c3cdbc210fb572d4,2025-01-13T18:15:20.490000
CVE-2025-0407,0,1,ad3b248e96a0fcb777157f95341630e1089e656ed1e5f38d08eba0350c50a941,2025-01-13T18:15:21.023000
CVE-2025-0405,0,1,6203d69c2ea9d8b524135de8a7adf37795735b2b486cc69ec882a2a0f5fe34a6,2025-01-13T19:15:11.227000
CVE-2025-0406,0,0,9d39f4351b80363b18f117ed5d9911db0718111194c53ca1c3cdbc210fb572d4,2025-01-13T18:15:20.490000
CVE-2025-0407,0,0,ad3b248e96a0fcb777157f95341630e1089e656ed1e5f38d08eba0350c50a941,2025-01-13T18:15:21.023000
CVE-2025-0408,0,0,a96acf9e81a811691f8b520b286233eef15e7059c8d8320ce584a1b7a8c2ed8a,2025-01-13T14:15:10.073000
CVE-2025-0409,0,1,5b16b7910d2f3bb912034acec9ddfb80ff7cbc22bd69b75269b1a49c27f02634,2025-01-13T18:15:21.430000
CVE-2025-0410,0,1,5453cf245c45b2e030c2d84dab023e8fd21c521b8dd76be3a4a1bd41b630f4d8,2025-01-13T18:15:21.730000
CVE-2025-0409,0,0,5b16b7910d2f3bb912034acec9ddfb80ff7cbc22bd69b75269b1a49c27f02634,2025-01-13T18:15:21.430000
CVE-2025-0410,0,0,5453cf245c45b2e030c2d84dab023e8fd21c521b8dd76be3a4a1bd41b630f4d8,2025-01-13T18:15:21.730000
CVE-2025-0412,0,0,bfbf47e0956b1bfccce4c3a829b70c8095a189edb5636c3ef3ebd81177784d3c,2025-01-13T04:15:06.477000
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
CVE-2025-20123,0,0,54512af23f890abd1fef44213c66523a0b62c1420699fcab5bda08e37f5f4455,2025-01-08T16:15:38.150000
@ -276643,7 +276648,9 @@ CVE-2025-22137,0,0,500e180482a18b49718c6495441b08426af3ad9db841f00b13a599eecbf00
CVE-2025-22139,0,0,62fc450acdd2ced803ece4801c69c5eb6552f5e1f8d20b6c12e23641dea96fdd,2025-01-08T20:15:29.693000
CVE-2025-22140,0,0,be66f05081c14fb2e0816483c4f45d3f628fc010fe866ea9da650e7ac4d60a3d,2025-01-08T20:15:29.800000
CVE-2025-22141,0,0,a527922fbc8add89576398e2e4e44f71f48d8da972b31e27b0c4985f7420a5dc,2025-01-08T20:15:29.897000
CVE-2025-22142,1,1,b970fe0f8b64f949fec07b44d4a082526fc7c2b1b36c7be124cc27643683e7e9,2025-01-13T20:15:29.677000
CVE-2025-22143,0,0,535b34000993ab6e069ce70a88afd72eb8046a8f188d22ed6e3f4d9ac657466d,2025-01-08T20:15:30.003000
CVE-2025-22144,1,1,ae2bb6940ac5435bda49b31c5d0e40c417a32362cc932c353730977d61f5ccb7,2025-01-13T20:15:29.817000
CVE-2025-22145,0,0,88df2b27b4a7796924aa6277caf85bae572e95291858d2eee15b7f4eb271d86c,2025-01-08T21:15:13.480000
CVE-2025-22149,0,0,a38f1d25924ff640550a2206f96377b56b7eb734e7bb1771523eee3ff2dd77f7,2025-01-09T18:15:30.233000
CVE-2025-22151,0,0,21f9e4fddd90599ac45f0514a6d95c5510077d3d9b45eefd94598514744d82c1,2025-01-09T19:15:20.410000
@ -276819,7 +276826,7 @@ CVE-2025-22598,0,0,e497fe58ac8675da7246094a2662199588779aa650b9c02699534f158225a
CVE-2025-22599,0,0,645942d1c7d2f7dd12d8618f2017edf7382a16a018a352b649288462de683267,2025-01-10T16:15:30.737000
CVE-2025-22600,0,0,5bcf7e241f56265340265c8ceca3bc4c44ef112e4d972ba43c49267d66196668,2025-01-10T16:15:30.940000
CVE-2025-22621,0,0,ffd9a82cf8c3aa7daf1fb231064828db28f1c16f80aac0f92c6df757403f534e,2025-01-07T17:15:35.710000
CVE-2025-22777,0,1,242cf60b2d99589847386f8f1b61f59a4927e791bc9c8d5220d1b9fa42c9eebc,2025-01-13T18:15:22
CVE-2025-22777,0,0,242cf60b2d99589847386f8f1b61f59a4927e791bc9c8d5220d1b9fa42c9eebc,2025-01-13T18:15:22
CVE-2025-22800,0,0,556018ca5feeb4d9fcefc62c608e69c8352f4bbcf6b60060e80b8843fc3177b7,2025-01-13T14:15:13.067000
CVE-2025-22801,0,0,c83deac6a5c5c2cba0bd79ad3064ebb1b72b5ce6e25705a33f2e1f95b55a8ff2,2025-01-09T16:16:29.323000
CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32ad7b,2025-01-09T16:16:29.470000
@ -276846,16 +276853,18 @@ CVE-2025-22823,0,0,16e8a59cbcc2bfc06c602dd1c4fa5e368ef951a41870f5a6e53ff24ecf09b
CVE-2025-22824,0,0,fb201e5b5828770ff11d00a29d3f8e00f0da01f397b44ffb8e7c8ad29623f7e1,2025-01-09T16:16:32.893000
CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000
CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000
CVE-2025-22828,0,1,28d1c765b7d74d78decce10490e63a055e82f37ae0f240bb1bf2461f2a535ce4,2025-01-13T18:15:22.143000
CVE-2025-22828,0,1,146919e8038c633aebea97dab991ef56f9be23b958183120e0167c3ba087763b,2025-01-13T19:15:11.373000
CVE-2025-22946,0,0,bbb309333efca2524774885144eccce64002a01a988a38ce2753d9bc51da626f,2025-01-10T15:15:16.710000
CVE-2025-22949,0,0,39d9572a05bfbbbc6c6a7518255a39870f82fdb4f4d926ef9b2339fd79f5588a,2025-01-10T16:15:31.137000
CVE-2025-22963,0,0,ddb005db611e43367f0caf5873d662acfb7b90267f1a87ba259499e665e1b39e,2025-01-13T16:15:19.367000
CVE-2025-23016,0,0,31a93833611c1f04fca5216d55a04a7c92375e0aedfa95a405475196dac4f70b,2025-01-10T12:15:25.480000
CVE-2025-23022,0,0,12b4268af4b5910f707f03dab9877afd2f72e34fc9d11a1b908b3e43ea4035dd,2025-01-10T16:15:31.250000
CVE-2025-23078,0,0,787208eb125873cdaeda6aad58b913bd32e17a0cac9bf50dcec492f4dc86b139,2025-01-10T18:15:26.877000
CVE-2025-23079,0,1,688568487a54a31b09fc20fca3268a4665f027f5a20c0e7845588469ec59e859,2025-01-13T18:15:22.470000
CVE-2025-23108,0,1,bf7d5127026a7b3e24519e57e5514e9c8f61188c4fc8ae46ad1a8e414e8fd737,2025-01-13T18:15:22.680000
CVE-2025-23109,0,1,b22a40d0cd6f5709ff1c9b97ba4e1adbf7087ff55aed713db176344e389fb640,2025-01-13T18:15:22.903000
CVE-2025-23026,1,1,6c6c6eea5e4491b52f4f485feac38dea4916b892d0e44aff834ce1fb5e02f83a,2025-01-13T20:15:30.003000
CVE-2025-23027,1,1,997c996b11a67c7e089e56fbd48e5f5dd49b8616ec28b2fbc8fd53aace203e73,2025-01-13T20:15:30.150000
CVE-2025-23078,0,1,6e2234483d99611921814b7d4b760ef5cfe8faae35f477da1f41cf4c536bce4f,2025-01-13T19:15:11.540000
CVE-2025-23079,0,0,688568487a54a31b09fc20fca3268a4665f027f5a20c0e7845588469ec59e859,2025-01-13T18:15:22.470000
CVE-2025-23108,0,0,bf7d5127026a7b3e24519e57e5514e9c8f61188c4fc8ae46ad1a8e414e8fd737,2025-01-13T18:15:22.680000
CVE-2025-23109,0,0,b22a40d0cd6f5709ff1c9b97ba4e1adbf7087ff55aed713db176344e389fb640,2025-01-13T18:15:22.903000
CVE-2025-23110,0,0,867db813d57403bbcc6a3d328d580ab49b5acf4f7dd1d1514716e26b355a6df2,2025-01-10T22:15:27.550000
CVE-2025-23111,0,0,1ad7a709e810907fc4a775b3bc42be99357664fb7b9ea9c87353d91f6efcd984,2025-01-10T22:15:27.723000
CVE-2025-23112,0,0,a562dc16cabefbf7dbab5fd0ace202da598b5a780a77bf2dded3f9d697b20716,2025-01-10T22:15:27.863000

Can't render this file because it is too large.